=171==
Mr. Smith is a lead incident responder of a
small financial enterprise, which has a few branches in Australia.
Smith先生是一家在澳洲有幾個分支的小型金融企業的主要事件響應者。
Recently, the company suffered a massive
attack, losing $5M through an inter-banking system.
最近,公司遭受了大規模攻擊,通過銀行間系統損失了500萬美元。
After an in-depth investigation, it was
found that the incident occurred because the attackers penetrated the network
through a minor vulnerability 6 months ago and maintained access without being
detected by any user.
經過深入調查發現,事件的發生是因為攻擊者在6個月前通過一個小漏洞滲透進網絡並保持訪問而未被任何用戶發現。
They then tried to delete user fingerprints
and performed several activities to monitor the computer of a person with
privileges in the inter-banking system.
他們隨後嘗試刪除用戶指紋並執行了多項活動來監視銀行間系統中有特權的人的電腦。
The attackers finally gained access and
performed fraudulent transactions.
攻擊者最終獲得訪問並進行了欺詐交易。
In the above scenario, which of the
following most accurately describes the type of attack?
在上述情況中,下列哪種攻擊類型最能準確描述這種攻擊?
A. Phishing 網路釣魚
B. Denial-of-service attack 拒絕服務攻擊
C. APT attack 高級持續性威脅攻擊
D. Ransomware attack 勒索軟體攻擊
=172==
Which of the following forensic
investigation phases should occur first?
下列哪個取證調查階段應該首先發生?
A. Perform the first responder procedure. 執行初次響應程序。
B. Collect preliminary evidence. 收集初步證據。
C. Create two-bit stream copies of the
evidence. 創建證據的兩個位元流副本。
D. Transport the evidence to the forensic
laboratory. 將證據運送到取證實驗室。
=173==
As an IT security officer, what is the
first step you will take after discovering a successful email compromise?
作為IT安全官員,在發現成功的電子郵件泄露後,你將採取的第一步是什麼?
A. Test the infected system to ensure
security. 測試受感染系統以確保安全。
B. Investigate similar hosts to determine
whether the attacker has compromised other systems. 調查類似主機以確定攻擊者是否已入侵其他系統。
C. Isolate the compromised system or take
steps to contain the attack. 隔離受感染系統或採取措施遏制攻擊。
D. Report the incident to the
organization's computer incident response team. 向組織的計算機事件響應團隊報告事件。
=174==
Which of the following is a term that
describes the combination of strategies and services intended to restore data,
applications, and other resources to the public cloud or dedicated service
providers?
以下哪個術語描述了旨在將數據、應用程序和其他資源恢復到公共雲或專用服務提供商的策略和服務的組合?
A. Eradication 根除
B. Mitigation 減輕
C. Cloud recovery 雲恢復
D. Analysis 分析
=175==
Drake is an incident handler at Dark Cloud
Inc.
Drake是Dark Cloud公司的事件處理員。
He is tasked with performing log analysis
to detect traces of malicious activities within the network infrastructure.
他的任務是執行日誌分析,以檢測網絡基礎設施內的惡意活動痕跡。
Which of the following tools should Drake
employ to view logs in real time and identify malware propagation within the
network?
Drake應該使用以下哪種工具來實時查看日誌並識別網絡內的惡意軟件傳播?
A. Splunk
B. Hydra
C. LOIC
D. HULK
=176==
Which of the following types of digital
evidence is temporarily stored in a digital device that requires constant power
supply and is deleted if the power supply is interrupted?
以下哪種數字證據類型暫時存儲在需要不間斷電源供應的數字設備中,並且如果電源供應中斷則會被刪除?
A. Event logs 事件日誌
B. Slack space 剩餘空間
C. Swap file 交換文件
D. Process memory 處理器記憶體
=177==
In the cloud environment, an authorized
security professional executes approved sanitation procedures using approved
utilities to permanently remove data spilled from contaminated information
systems and applications in the cloud.
在雲環境中,授權的安全專業人員使用批准的工具執行批准的清理程序,以永久刪除來自受污染的信息系統和應用程序的雲中的數據。
This is an example of which of the
following?
這是哪一種情況的例子?
A. Cloud auditor 雲審計
B. Cloud eradication 雲清理
C. Cloud broker 雲經紀人
D. Cloud computing 雲計算
=178==
Which of the following is a technique used
by attackers to make a message difficult to understand through the use of
ambiguous language?
以下哪種技術是攻擊者用來通過使用模棱兩可的語言使消息難以理解?
A. Spoofing 偽裝
B. Obfuscation 模糊化
C. Encryption 加密
D. Steganography 隱寫術
=179==
Which of the following is a volatile
evidence collecting tool?
以下哪項是易揮發證據收集工具?
A. HashTool
B. FTK Images
C. ProDiscover Forensics
D. Netstat
=180==
An insider threat response plan helps an
organization minimize the damage caused by malicious insiders.
內部威脅響應計劃幫助組織最大限度地減少惡意內部人員造成的損害。
One of the approaches to mitigate these
threats is setting up controls from the human resources department.
減輕這些威脅的方法之一是從人力資源部門設置控制措施。
Which of the following guidelines can the
human resources department use?
人力資源部門可以使用以下哪項指南?
A. Monitor and secure the organization's
physical environment. 監控和保護組織的物理環境。
B. Disable the default administrative
account to ensure accountability. 禁用默認管理帳戶以確保問責制。
C. Access granted to users should be
documented and vetted by a supervisor. 用戶授予的訪問權限應記錄並經主管審查。
D. Implement a person-to-person rule to
secure the backup process and physical media. 實施人對人規則以保護備份過程和物理媒體。
CACCA DABDC
留言
張貼留言