跳到主要內容

ECIH_B_001-010

 =001==

XYZ Corp. recently shifted its infrastructure to Microsoft Azure and soon after faced an unexpected data breach.

XYZ公司最近將其基礎設施轉移到Microsoft Azure,但不久後就遭遇了意外的數據洩漏事件。

The event led to confidential data being accessed by an unauthorized user.

該事件導致機密數據被未經授權的用戶訪問。

As the newly appointed EC-Council Certified Incident Handler, you are tasked with improving the incident response strategy to prevent such security incidents in the future.

作為新任命的EC-Council認證事件處理人員,您被要求改進事件響應策略,以防止未來發生此類安全事件。

What is the best course of action?

最佳行動方案是什麼?

·Activate Azure disk encryption for all data stored in the cloud.啟用Azure磁碟加密,對雲端中儲存的所有數據進行加密。

·Transition all operations to Azure private network to enhance control over data.將所有操作轉移到Azure私人網路,以增強對數據的控制。

·Implement Azure network security groups to limit access to resources.實施Azure網路安全群組,限制對資源的訪問。

·Set up Azure Security Center and enable just-in-time VM access.設置Azure安全中心並啟用即時虛擬機存取。

=002==

The CEO of a leading financial institution received a blackmail email containing highly confidential financial data.

一家領先金融機構的執行長收到了一封包含高度機密財務數據的勒索電子郵件。

The incident response (IR) team, utilizing cutting-edge digital forensics, pinpointed the attacker and prepared evidence for legal action.

事件響應(IR)小組利用最先進的數位取證技術,確定了攻擊者並準備了法律行動的證據。

They also conducted a thorough analysis of the breach and the existing security measures.

他們還對洩漏事件及現有的安全措施進行了徹底分析。

Based on their extensive investigation, what specific recommendations did the IR team most likely provide to the organization?

根據他們的全面調查,IR小組最有可能向組織提供哪些具體建議?

·Increase salaries of the executive team to boost morale提高高層管理團隊的薪水以提升士氣

·Expand the company's business into new markets將公司的業務擴展到新市場

·Invest in marketing to restore the brand image投資於行銷以恢復品牌形象

·Enhance security controls, offer training on security awareness, and implement continuous monitoring加強安全控制,提供安全意識培訓並實施持續監控

=003==

Alpha Tech's CISO received an alert regarding suspicious activity on multiple endpoints.

Alpha Tech 的首席資訊安全官(CISO)收到有關多個端點出現可疑活動的警報。

The symptoms aligned with a malware incident where data appeared to be exfiltrated to an external server.

這些症狀與一個惡意軟體事件相符,數據似乎被外流到外部伺服器。

Facing a potential crisis, the security team convened.

面對潛在的危機,安全團隊召開了會議。

Which containment strategy should they deploy first?

他們應該首先部署哪種遏制策略?

·Implement multi-factor authentication across all user accounts.在所有用戶帳戶中實施多因素認證。

·Notify the legal team and prepare a public statement.通知法律團隊並準備公開聲明。

·Roll back all systems to the last known good configuration.將所有系統回滾到最後一次已知的良好配置。

·Isolate the network segments showing the suspicious activity.隔離顯示可疑活動的網路區段。

=004==

In a hypothetical scenario, you are an EC-Council Certified Incident Handler (ECIH),

在一個假設情景中,您是 EC-Council 認證事件處理員(ECIH),

and you have been called to handle an incident at a large multinational corporation where a significant data breach has been detected.

並且被召喚去處理一家大型跨國公司發生的重大數據泄露事件。

The breach involves a cloud-hosted database containing sensitive client information.

這次泄露涉及一個雲端託管的數據庫,包含敏感的客戶信息。

You need to secure and document the crime scene.

您需要保護並記錄犯罪現場。

Which of the following steps is most appropriate as your first response?

以下哪個步驟最適合作為您的首次回應?

·Document the state of the cloud environment, including system logs and configurations.記錄雲環境的狀態,包括系統日誌和配置。

·Remotely login and shut down the compromised database to prevent further access.遠程登錄並關閉受損的數據庫以防止進一步訪問。

·Begin with a comprehensive network traffic analysis to identify the source of the breach.開始進行綜合網絡流量分析以確定泄露源。

·Immediately inform all clients about the breach and the potential loss of data.立即通知所有客戶有關洩漏和潛在數據丟失的情況。

=005==

You are the cloud security incident response manager for a large organization.

您是某大型組織的雲端安全事件響應經理。

Your team has identified a potential security incident in the cloud environment.

您的團隊已經確認雲環境中發生了潛在的安全事件。

Upon investigation, you find that an unauthorized individual gained access to a critical database containing sensitive customer information.

經過調查,您發現有未經授權的個人訪問了包含敏感客戶信息的關鍵數據庫。

What is the MOST appropriate immediate action to take?

最適當的立即行動是什麼?

·Collect evidence and preserve logs for forensic analysis.收集證據並保留日誌以進行取證分析。

·Engage the organization's legal team to assess potential liability and regulatory obligations.聘請組織的法律團隊以評估潛在責任和法規義務。

·Notify affected customers and guide them on protecting their personal information.通知受影響的客戶並指導他們保護個人信息。

·Shut down the compromised database server to prevent further unauthorized access.關閉受損的數據庫伺服器以防止進一步的未授權訪問。

=006==

An employee in the finance department accesses confidential financial data outside of their job duties.

財務部門的一名員工訪問了其工作職責之外的機密財務數據。

What is the most effective way to prevent this type of insider threat?

防止這種內部威脅的最有效方法是什麼?

·Educate employees on the consequences of violating company policies.教育員工有關違反公司政策的後果。

·Conduct regular background checks on all employees.對所有員工進行定期背景調查。

·Increase monitoring and surveillance of employee activity.增加對員工活動的監控和監視。

·Implement role-based access controls and limit access to sensitive data.實施基於角色的訪問控制並限制訪問敏感數據。

=007==

A company's network experiences a distributed denial-of-service (DDoS) attack, causing significant disruption to its online services.

一家公司網絡遭受分散式阻斷服務(DDoS)攻擊,導致其在線服務嚴重中斷。

What is the best course of action for the incident response team in this scenario?

在這種情況下,最佳的事件響應措施是什麼?

·Identify the origin of the DDoS attack and pursue legal action against the attackers.確定 DDoS 攻擊的源頭並對攻擊者採取法律行動。

·Implement additional network security measures to prevent future DDoS attacks.實施額外的網絡安全措施以防止未來的 DDoS 攻擊。

·Utilize a robust DDoS mitigation solution to filter and block malicious traffic.使用強大的 DDoS 緩解解決方案來過濾和阻止惡意流量。

·Promptly inform senior management and relevant stakeholders about the ongoing attack.迅速通知高級管理層和相關利益相關者有關攻擊的最新情況。

=008==

After identifying a compromised workstation at CyberFirm Inc.,

在確認 CyberFirm Inc. 的一個工作站被攻破後,

the incident handling team needs to transport the physical evidence to a secure location.

事件處理團隊需要將實體證據運送到安全位置。

What is the primary consideration during this phase?

在這個階段主要考慮的是什麼?

·Ensure that the device is connected to the internet to monitor ongoing malicious activities.確保設備連接到互聯網以監控正在進行的惡意活動。

·Immediately start analyzing the evidence to understand the extent of the compromise.立即開始分析證據以了解妥協的範圍。

·Transport the evidence without its power source to avoid tampering.在不斷電的情況下運送證據以避免篡改。

·Label the device with its original location, handler's name, date, and time.標記設備的原始位置、處理者的姓名、日期和時間。

=009==

While handling and responding to a potential web application security incident,

在處理和應對潛在的網絡應用程序安全事件時,

you are required to conduct a vulnerability scan of your website.

您需要對您的網站進行漏洞掃描。

As an EC-Council Certified Incident Handler(ECIH),

作為 EC-Council 認證事件處理員(ECIH),

which of the following steps is NOT part of the process of performing web application vulnerability scanning using Acunetix Web Vulnerability Scanner(WVS)?

以下哪一項不是使用 Acunetix 網絡漏洞掃描器(WVS)進行網絡應用漏洞掃描過程的一部分?

·Use the built-in HTTP Editor and HTTP Fuzzer of Acunetix WVS to manually test and validate potential vulnerabilities before scanning.使用 Acunetix WVS 的內建 HTTP 編輯器和 HTTP Fuzzer 來手動測試並驗證潛在漏洞。

·After scanning, view vulnerabilities, analyze their details, and formulate a plan to fix them.掃描後,查看漏洞,分析詳情,並制定修復計劃。

·Perform a full scan, select OWASP Top 10 2017 from the report, and schedule the scan instantly.執行全面掃描,選擇報告中的 OWASP Top 10 2017,並立即安排掃描。

·Install Acunetix WVS on a Windows 10 virtual machine and log in with the provided credentials. Windows 10 虛擬機上安裝 Acunetix WVS 並使用提供的憑證登錄。

=010==

A leading tech firm is reassessing its incident response strategy following a series of cyber-attacks.

一家領先的技術公司正在重新評估其事件響應策略,以應對一系列的網絡攻擊。

The Incident Response Team has proposed to fine-tune the plan to better adapt to evolving threats.

事件響應團隊提出了細化計劃的建議,以更好地適應不斷演變的威脅。

The focus is on reducing response time while accurately assessing the nature and impact of various incidents.

重點是縮短響應時間,同時準確評估各種事件的性質和影響。

In this context, which of the following methods would be the MOST suitable to apply within the incident response and handling process?

在這種情況下,以下哪種方法最適合應用於事件響應和處理過程?

·Focus on implementing static rules in the Security Information and Event Management (SIEM) system and follow a rigid set of predefined response protocols, irrespective of incident complexity.專注於在安全信息和事件管理(SIEM)系統中實施靜態規則,並遵循一套預定義的響應協議,無論事件的複雜性如何。

·Integrate a robust threat intelligence system, fostering collaboration between teams, and aligning incident response to the organization's risk appetite and overall business objectives.整合強大的威脅情報系統,促進團隊之間的合作,並使事件響應與組織的風險承受能力和整體業務目標保持一致。

·Utilize automated Threat detection tools exclusively, minimizing human involvement to lower response time and apply AI-driven log analysis.專門使用自動化威脅檢測工具,將人工干預降到最低,降低響應時間並應用 AI 驅動的日誌分析。

·Prioritize the immediate containment of incidents, even before analyzing their nature, by shutting down affected systems and ignoring potential secondary consequences.優先考慮事件的立即遏制,即使在分析其性質之前,也要通過關閉受影響的系統並忽略潛在的次要後果。                                                                                                                                                DDDAD DCDAB

留言

這個網誌中的熱門文章

ECIH_A_051-060

  =051== In which of the following phases of incident handling and response (IH&R) process are the identified security incidents analyzed, validated, categorized, and prioritized? 在事件處理和響應 (IH&R) 流程的哪個階段,已識別的安全事件會被分析、驗證、分類和優先排序? A. Incident triage, 事件分類 B. Notification, 通知 C. Incident recording and assignment, 事件記錄和分配 D. Containment, 控制   =052== Browser data can be used to access various credentials. 瀏覽器數據可以用來訪問各種憑證。 Which of the following tools is used to analyze the history data files in Microsoft Edge browser? 以下哪個工具用於分析 Microsoft Edge 瀏覽器中的歷史數據文件? A. MZHistoryView B. BrowsingHistoryView C. ChromeHistoryView D. MZCacheView   =053== Eve is an incident handler in ABC organization. Eve 是 ABC 組織的事件處理人員。 One day, she got a complaint about an email hacking incident from one of the employees of the organization. 有一天,她收到該組織的一名員工關於電子郵件駭客事件的投訴。 As an incident handler, Eve follows a set of recovery steps in order to recover...

ECIH_B_031-040

=031== An employee accidentally emails confidential customer information to a personal email address. 一名員工不小心將機密客戶資訊發送到個人電子郵件地址。 What is the biggest challenge faced by the incident response team in this scenario? 在此情境中,事件回應團隊面臨的最大挑戰是什麼? Ⓐ Determining the intent of the employee 確定員工的意圖 Ⓑ Balancing the need for confidentiality and transparency with stakeholders 平衡保密需求與對利害關係人保持透明之間的需求 Ⓒ Identifying the extent of the damage caused by the incident 確定事件造成的損害程度 Ⓓ Identifying the source of the email server used to send the email 確定用於發送郵件的電子郵件伺服器的來源 =032== An incident handling team has been alerted about a possible security breach on a Linux system. 一個事件處理團隊收到有關 Linux 系統可能發生安全漏洞的警報。 As an EC-Council Certified Incident Handler, you decide to perform an incident triage using a tool named buck-security on Linux. 作為 EC-Council 認證的事件處理人員,您決定使用名為 buck-security 的工具在 Linux 上進行事件分類。 After conducting the security check, buck-security returns a warning message indicating a ...