=191==
Which of the following are malicious
software programs that infect computers and corrupt or delete the data on them?
以下哪一項是惡意軟體程式,會感染電腦並損壞或刪除其上的資料?
A. Trojans 木馬程式
B. Worms 蠕蟲
C. Spyware 間諜軟體
D. Virus 病毒
=192==
Stanley works as an incident responder at a
top MNC based in Singapore.
Stanley 是新加坡一流跨國公司的事件響應人員。
He was asked to investigate a cybersecurity
incident that recently occurred in the company.
他被要求調查公司最近發生的網絡安全事件。
While investigating the incident, he
collected evidence from the victim systems.
在調查事件時,他從受害系統中收集了證據。
He must present this evidence in a clear
and comprehensible manner to the members of a jury so that the evidence
clarifies the facts and further helps in obtaining an expert opinion on the
incident to confirm the investigation process.
他必須以清晰和易於理解的方式向陪審團成員展示這些證據,以便證據澄清事實,並進一步有助於獲得專家對事件的意見以確認調查過程。
In the above scenario, which of the
following characteristics of the digital evidence did Stanley attempt to
preserve?
在上述情境中,Stanley 試圖保留數位證據的以下哪一個特徵?
A. Completeness 完整性
B. Admissibility 可接受性
C. Authenticity 真實性
D. Believability 可信度
=193==
Sam, an employee of a multinational
company, sends emails to third-party organizations with a spoofed email address
of his organization.
Sam 是一家跨國公司的員工,他使用偽造的公司電子郵件地址向第三方組織發送電子郵件。
How can you categorize this type of
incident?
你如何分類這種類型的事件?
A. Unauthorized access incident 未經授權的訪問事件
B. Denial-of-service incident 拒絕服務事件
C. Impersonation attack incident 冒充攻擊事件
D. Network intrusion incident 網絡入侵事件
=194==
Jacob is an employee at a firm called
Dolphin Investment.
Jacob 是一家名為 Dolphin Investment 公司的員工。
While he was on duty, he identified that
his computer was facing some problems, and he wanted to convey the issue to the
concerned authority in his organization.
在他值班時,他發現他的電腦遇到了一些問題,他想將這個問題告知公司內相關部門。
However, this organization currently does
not have a ticketing system to address such types of issues.
然而,這家公司目前沒有票務系統來處理這類問題。
In the above scenario, which of the
following ticketing systems can be employed by Dolphin Investment to allow
Jacob to inform the concerned team about the incident?
在上述情境中,Dolphin Investment 可以採用以下哪個票務系統讓 Jacob 告知相關團隊事件?
A. MISP
B. ThreatConnect
C. ManageEngine ServiceDesk Plus
D. IBM XForce Exchange
=195==
Ryan is working in the eradication phase,
wherein he is eliminating the root cause of an incident that occurred in the
Windows operating system installed in a system.
Ryan 正在消除階段,消除發生在安裝了 Windows 操作系統的系統中的事件根本原因。
He ran a tool that can detect missing patches
in the system and install the latest patches on the system and networks.
他運行了一個工具,該工具可以檢測系統中缺少的補丁並安裝系統和網絡上的最新補丁。
Which of the following tools did Ryan use
to accomplish missing security patches?
Ryan 使用以下哪一個工具來完成缺少的安全補丁?
A. Microsoft Baseline Security Analyzer 微軟基準安全分析器
B. Microsoft Advanced Threat Analytics 微軟高級威脅分析
C. Office365 Advanced Threat Protection
Office365 高級威脅保護
D. Microsoft Cloud App Security 微軟雲端應用安全
=196==
Which of the following best describes an
email issued as an attack medium, in which several messages are sent to a
mailbox to cause overflow?
以下哪一項最能描述作為攻擊媒介的電子郵件,其中多封消息發送到郵箱以導致溢出?
A. Spoofing 偽裝
B. Email-bombing 電子郵件炸彈
C. Masquerading 冒充
D. Smurf attack Smurf 攻擊
=197==
Oscar receives an email from an unknown
source containing his domain name oscar.com.
Oscar 收到一封來自未知來源的電子郵件,其中包含他的域名 oscar.com。
Upon checking the link, he found that it
contains a malicious URL that redirects to the website evilsite.org.
檢查鏈接後,他發現它包含一個惡意 URL,會重定向到網站 evilsite.org。
What type of vulnerability is this?
這是哪種類型的漏洞?
A. Unvalidated redirects and forwards 未經驗證的重定向和轉發
B. SQL injection SQL 注入
C. Malware 惡意軟體
D. Botnet 殭屍網絡
=198==
A user downloaded what appears to be
genuine software.
用戶下載了看起來是正版的軟體。
Unknown to her, when she installed the
application, it executed code that provided an unauthorized remote attacker
access to her computer.
她不知道的是,當她安裝應用程式時,它執行了代碼,使未經授權的遠程攻擊者訪問她的計算機。
What type of malicious threat displays this
characteristic?
具有此特徵的惡意威脅是哪種類型?
A. Backdoor 後門
B. Trojan 木馬程式
C. Worm 蠕蟲
D. Spyware 間諜軟體
=199==
If a hacker cannot find any other way to
attack an organization, they can influence an employee or a disgruntled staff
member.
如果駭客找不到其他方法攻擊組織,他們可以影響員工或心懷不滿的員工。
What type of threat is this?
這是哪種類型的威脅?
A. Identity theft 身份盜竊
B. Footprinting 足跡
C. Insider attack 內部攻擊
D. Phishing attack 魚叉攻擊
=200==
A colleague wants to minimize their
security responsibility because they are in a small organization.
一位同事希望將其安全責任降到最低,因為他們在一家小型組織中。
They are evaluating a new application that
is offered in different forms.
他們正在評估一種以不同形式提供的新應用程式。
Which form would result in the least amount
of responsibility for the colleague?
哪種形式會導致同事的責任最小化?
A. On-prem installation 本地安裝
B. SaaS 軟體即服務
C. PaaS 平台即服務
D. IaaS 基礎設施即服務
DDCCA BACCB
留言
張貼留言