=071==
Which of the following GPG18 and Forensic
readiness planning (SPF) principles states that "organizations should
adopt a scenario based Forensic Readiness Planning approach that learns from
experience gained within the business"?
以下哪一項GPG18和鑑識準備計劃(SPF)原則指出,“組織應採用基於情境的鑑識準備計劃方法,從業務中獲得的經驗中學習”?
A. Principle 3 原則3
B. Principle 5 原則5
C. Principle 2 原則2
D. Principle 7 原則7
=072==
An attacker uncovered websites a target
individual was frequently surfing.
攻擊者發現了一個目標個體經常瀏覽的網站。
The attacker then tested those particular
websites to identify possible vulnerabilities.
然後,攻擊者測試了這些特定網站以識別可能的漏洞。
After detecting vulnerabilities within a
website, the attacker started injecting malicious script/code into the web
application that would redirect the webpage and download the malware onto the
victim’s machine.
在發現網站漏洞後,攻擊者開始向網頁應用程式注入惡意腳本/代碼,這些代碼會重定向網頁並將惡意軟體下載到受害者的機器上。
After infecting the vulnerable web
application, the attacker waited for the victim to access the infected web
application.
在感染了易受攻擊的網頁應用程式後,攻擊者等待受害者訪問受感染的網頁應用程式。
Identify the type of attack performed by
the attacker.
識別攻擊者執行的攻擊類型。
A. Watering hole 水坑攻擊
B. Cookie/Session poisoning Cookie/會話中毒
C. Obfuscation application 混淆應用程式
D. Directory traversal 目錄遍歷
=073==
Ross is an incident manager (IM) and his
team provides support to all users in the organization that are affected by the
threat or attack.
Ross是一名事件經理(IM),他的團隊為組織中受威脅或攻擊影響的所有用戶提供支援。
David, who is the organizational internal
auditor, is also part of the Ross’s incident response team.
David是組織內部審計師,也是Ross的事件響應團隊的一員。
Among the following duties, identify one of
the responsibilities of David.
在以下職責中,確定David的一項責任。
A. Configure information security controls 配置信息安全控制
B. Coordinate incident containment
activities with the information security officer (ISO) 與信息安全官員(ISO)協調事件控制活動
C. Perform the necessary action required to
block the network traffic from the suspected intruder 執行必要的操作以阻止來自可疑入侵者的網絡流量
D. Identify and report security loopholes
to management for necessary action 識別並向管理層報告安全漏洞以便採取必要行動
=074==
Alice is a disgruntled employee.
Alice是一名心懷不滿的員工。
She decided to acquire critical information
from her organization for personal benefit.
她決定從組織獲取關鍵信息以謀取個人利益。
To accomplish this, Alice started running a
virtual machine on the same physical host as her victim’s virtual machine and
took advantage of shared physical resources (processor cache) to steal data
(cryptographic key/pain text secrets) from the victim machine.
為此,Alice開始在與受害者的虛擬機器相同的物理主機上運行虛擬機器,並利用共享的物理資源(處理器快取)從受害者機器中竊取數據(加密密鑰/明文秘密)。
Identify the type of attack Alice is
performing in the above scenario.
識別Alice在上述情況下執行的攻擊類型。
A. Service hijacking 服務劫持
B. Man-in-the-cloud attack 雲端中間人攻擊
C. SQL injection attack SQL注入攻擊
D. Side channel attack 側信道攻擊
=075==
A computer virus hoax is a message warning
the recipient of a non-existent computer virus threat.
計算機病毒惡作劇是一條警告接收者關於不存在的計算機病毒威脅的消息。
The message may claim that a chain-email
that tells the recipient to forward it to everyone they know.
該消息可能聲稱是一封鏈式電子郵件,要求接收者將其轉發給他們認識的所有人。
Which of the following are the two types of
hoax virus message?
以下哪兩種是病毒惡作劇消息的類型?
A. The message warns to delete certain
files if the user does not take appropriate action 如果用戶不採取適當行動,該消息會警告刪除某些文件
B. The message tricks the user by indicating
it was caught by SPAM filters due to change in their settings 該消息通過指示它因設置變更而被SPAM過濾器捕獲來欺騙用戶
C. The message convinces the user to add
the sender to his/her email contact list and gain monetary benefits 該消息說服用戶將發送者添加到其電子郵件聯繫人列表中並獲得金錢利益
D. The message prompts the user to install
Anti-virus 該消息提示用戶安裝防病毒軟件
=076==
Alexis is working as an incident responder
in XYZ organization.
Alexis在XYZ組織中擔任事件響應者。
She was asked to identify and attribute the
actors behind an attack that took place recently.
她被要求識別並歸因於最近發生的一次攻擊背後的行為者。
In order to do so, she is performing threat
attribution that deals with the identification of the specific person, society,
or country sponsoring a well-planned and executed intrusion or attack on its
target.
為此,她正在進行威脅歸因,處理對贊助有計劃且執行良好的入侵或攻擊的特定個人、社會或國家的識別。
Which of the following types of threat
attributions has Alexis performed?
Alexis執行了以下哪種類型的威脅歸因?
A. Campaign attribution 活動歸因
B. True attribution 真實歸因
C. Nation-state attribution 國家歸因
D. Intrusion-set attribution 入侵集歸因
=077==
QualTech Solutions is a leading security
services enterprise.
QualTech Solutions是一家領先的安全服務企業。
Dickson works as an incident responder with
them.
Dickson在該公司擔任事件響應者。
He is performing a vulnerability assessment
to identify the security problems in the network, using tools to identify the
hosts, services, and vulnerabilities present in the enterprise network.
他正在進行漏洞評估,以識別網絡中的安全問題,使用工具來識別企業網絡中的主機、服務和漏洞。
Based on the above scenario, identify the
type of vulnerability assessment performed by Dickson.
根據上述情況,確定Dickson進行的漏洞評估類型。
A. External assessment 外部評估
B. Internal assessment 內部評估
C. Passive assessment 被動評估
D. Active assessment 主動評估
=078==
Which of the following digital evidence is
temporarily stored on a digital device that requires a constant power supply and
is deleted if the power supply is interrupted?
以下哪項數位證據臨時存儲在數位設備上,需要持續供電,如果電源中斷則被刪除?
A. Event logs 事件日誌
B. Process memory 處理器記憶體
C. Slack space 空閒空間
D. Swap file 交換檔案
=079==
Which of the following terms refers to an
organization’s ability to make optimal use of digital evidence in a limited
period of time and with minimal investigation costs?
以下哪個術語指的是組織在有限的時間內以最少的調查成本最佳利用數位證據的能力?
A. Risk assessment 風險評估
B. Data analysis 數據分析
C. Threat assessment 威脅評估
D. Forensic readiness 鑑識準備
=080==
Farheen is an incident responder at reputed
IT Firm based in Florida.
Farheen是佛羅里達州一家知名IT公司的事件響應者。
Farheen was asked to investigate a recent
cybercrime faced by the organization.
Farheen被要求調查公司最近遭遇的一起網絡犯罪。
As part of this process, she collected
static data from a victim system.
作為該過程的一部分,她從受害者系統中收集了靜態數據。
She used dd, a commandline tool, to perform
forensic duplication to obtain an NTFS image of the original disk.
她使用命令行工具dd進行鑑識複製以獲取原始磁碟的NTFS映像。
She created a sector-by-sector mirror
imaging of the disk and saved the output image file as evidence.
她創建了磁碟的扇區鏡像並將輸出映像文件保存為證據。
Identify the static data collection process
step performed by Farheen while collecting static data.
識別Farheen在收集靜態數據時執行的靜態數據收集過程步驟。
A. Physical presentation 物理呈現
B. Administrative consideration 行政考量
C. System preservation 系統保存
D. Comparison 比較
答案 BBDDB CBBDC
留言
張貼留言