Questions From Online Exams
Questions From Online Exams
Questions From Online Exams
2. Which two HTTP header fields relate to intrusion analysis? (Choose two).
user-agent
host
connection
language
handshake type
3. Which component of the NIST SP800-61 r2 incident handling strategy reviews data?
preparation
detection and analysis
containment, eradication, and recovery
post-incident analysis
4. Which option is generated when a file is run through an algorithm and generates a
string specific to the contents of that file?
URL
hash
IP address
destination port
6. Which CVSSv3 metric captures the level of access that is required for a successful
attack?
attack vector
attack complexity
privileges required
user interaction
delivery
reconnaissance
action on objectives
installation
exploitation
snooping
hacking
theft
assault
10. Which stakeholder group is responsible for containment, eradication, and recovery in
incident handling?
facilitators
practitioners
leaders and managers
decision makers
11. Refer to the exhibit. You notice that the email volume history has been abnormally
high. Which potential result is true?
12. A user on your network receives an email in their mailbox that contains a malicious
attachment. There is no indication that the file was run. Which category as defined in the
Kill-chain model does this activity fall under?
reconnaissance
weaponization
delivery
installation
13. During which phase of the forensic process are tools and techniques used to extract
the relevant information from the collective data?
examination
reporting
collection
investigation
14. Which option allows a file to be extracted from a TCP stream within Wireshark?
15. Refer to the exhibit. Which type of log is this an example of?
IDS log
proxy log
NetFlow log
syslog
16. Refer to the exhibit. Which type of log is this an example of?
syslog
NetFlow log
proxy log
IDS log
17. Which element can be used by a threat actor to discover a possible opening into a
target network and can also be used by an analyst to determine the protocol of the
malicious traffic?
TTLs
ports
SMTP replies
IP addresses
18. In Microsoft Windows, as files are deleted the space they were allocated eventually is
considered available for use by other files. This creates alternating used and unused areas
of various sizes. What is this called?
19. In the context of incident handling phases, which two activities fall under scoping?
(Choose two.)
determining the number of attackers that are associated with a security incident
ascertaining the number and types of vulnerabilities on your network
identifying the extent that a security incident is impacting protected resources on
the network
determining what and how much data may have been affected
identifying the attackers that are associated with a security incident
col[0-9]+our
colo?ur
colou?r
]a-z]{7}
22. Which process is being utilized when IPS events are removed to improve data
integrity?
data normalization
data availability
data protection
data signature
organization mission
junior analyst approval
day-to-day firefighting
siloed approach to communications
24. Which CVSSv3 metric value increases when attacks consume network bandwidth,
processor cycles, or disk space?
confidentiality
integrity
availability
complexity
25. Which Security Operations Center’s goal is to provide incident handling to a country?
Coordination Center
Internal CSIRT
National CSIRT
Analysis Center
26. A CMS plugin creates two files that are accessible from the Internet myplugin.html and
exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability
in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific
variables to exploitable.php. You see traffic to your webserver that consists of only HTTP
GET requests to myplugin.html. Which category best describes this activity?
weaponization
exploitation
installation
reconnaissance
28. Refer to the Exhibit. A customer reports that they cannot access your organization’s
website. Which option is a possible reason that the customer cannot access the website?
The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.
The server at 10.67.10.5 has a virus.
A vulnerability scanner has shown that 10.67.10.5 has been compromised.
Web traffic sent from 10.67.10.5 has been identified as malicious by Internet
sensors.
IP address
URL
ports
MAC address
30. Which type of analysis assigns values to scenarios to see what the outcome might be in
each scenario?
deterministic
exploratory
probabilistic
descriptive
31. Which feature is used to find possible vulnerable services running on a server?
CPU utilization
security policy
temporary internet files
listening ports
32. Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?
1986
2318 (would be correct if there was not the GET command with the path)
2542 (because it has the HTTP/1.1 200 and the gif is in the info.)
2317
33. Which two options can be used by a threat actor to determine the role of a server?
(Choose two.)
PCAP
tracert
running processes
hard drive configuration
applications
34. Which option creates a display filter on Wireshark on a host IP address or name?
35. You receive an alert for malicious code that exploits Internet Explorer and runs
arbitrary code on the site visitor machine. The malicious code is on an external site that is
being visited by hosts on your network. Which user agent in the HTTP headers in the
requests from your internal hosts warrants further investigation?
36. During which phase of the forensic process is data that is related to a specific event
labeled and recorded to preserve its integrity?
collection
examination
reporting
investigation
port number
destination IP address
data packet
user name
host logs
39. In VERIS, an incident is viewed as a series of events that adversely affects the
information assets of an organization. Which option contains the elements that every
event is comprised of according to VERIS incident model’?
TCP
SSH
HTTP
SSL
41. You see confidential data being exfiltrated to an IP address that is attributed to a
known Advanced Persistent Threat group. Assume that this is part of a real attack and not
a network misconfiguration. Which category does this event fall under as defined in the
Diamond Model of Intrusion?
reconnaissance
weaponization
delivery
action on objectives
42. Refer to the exhibit. We have performed a malware detection on the Cisco website.
Which statement about the result is true?
43. Which option has a drastic impact on network traffic because it can cause legitimate
traffic to be blocked?
true positive
true negative
false positive
false negative
44. Which CVSSv3 metric value increases when the attacker is able to modify all files
protected by the vulnerable component?
confidentiality
integrity
availability
complexity
45. Which type of analysis allows you to see how likely an exploit could affect your
network?
descriptive
casual
probabilistic
inferential
46. Which network device creates and sends the initial packet of a session?
source
origination
destination
network
47. When performing threat hunting against a DNS server, which traffic toward the
affected domain is considered a starting point?
HTTPS traffic
TCP traffic
HTTP traffic
UDP traffic
48. An organization has recently adjusted its security stance in response to online threats
made by a known hacktivist group. Which term defines the initial event in the NIST SP800-
61 r2?
Indicator is a sign that an incident may have occurred or may be occurring now.
Precursor is a sign that an incident may occur in the future
online assault
trigger
49. You have run a suspicious file in a sandbox analysis tool to see what the file does. The
analysis report shows that outbound callouts were made post infection. Which two pieces
of information from the analysis report are needed or required to investigate the callouts?
(Choose two.)
file size
domain names
dropped files
signatures
host IP addresses
50. Which option filters a LibPCAP capture that used a host as a gateway?
Analysis Center
National CSIRT
Internal CSIRT
Physical Security
52. What information from HTTP logs can be used to find a threat actor?
referer
IP address
user-agent
URL
54. Refer to the exhibit. What can be determined from this ping result?
The public IP address of cisco.com is 2001:420:1101:1::a.
The Cisco.com website is down.
The Cisco.com website is responding with an internal IP.
The public IP address of cisco.com is an IPv4 address.
55. What mechanism does the Linux operating system provide to control access to files?
privileges required
user interaction
file permissions
access complexity
rx
regeegex
r(ege)x
rege+x
59. Which kind of evidence can be considered most reliable to arrive at an analytical
assertion?
direct
corroborative
indirect
circumstantial
textual
60. Which CVSSv3 Attack Vector metric value requires the attacker to physically touch or
manipulate the vulnerable component?
local
physical
network
adjacent
61. Which option can be addressed when using retrospective security techniques?
62. Drag and drop the type of evidence from the left onto the correct description(s) of that
evidence on the right.
Indirect evidence – firewall log showing successful communication and threat intelligence
stating an IP is known to host malware
Direct evidence – log that shows a command and control check-in from verified malware
63. Drag and drop the elements of incident handling from the left into the correct order on
the right.
1-Preparation
80 - Source port
60 - Number of packets
TCP – Protocol (είναι το 6 που λεει στο screenshot αλλα ετσι και αλλιως δεν υπηρχε άλλη
επιλογη)
netstat –a
netstat -l
netstat -v
netstat -g
data accuracy(integrity)
data availability
data normalization
data confidentiality
data visualisation
68. Filtering ports in wireshark?
tcp.port == 80
tcp port equals 80
tcp.port 80
port 80
confidentiality/possession
integrity/authenticity
availability/utility
Non-Admin Closure
Network Access Control
Nepal Airline Corporations
Network Address Control
802.1Q
802.1X (EAP-TLS, EAP-PEAP or EAP-MSCHAP)
802.1E
802.1F
this metric measures the impact to the confidentiality of the information resources managed
by a software component due to a successfully exploited vulnerability.
73. Which of the following are examples of some of the responsibility of a corporate CSIRT
and the policies it helps create? (Choose four)
75. Which of the following has been used to evade IDS / IPS devices?
SNMP
HTTP
TNP
Fragmentation
77. Which of the following is an example of a managed security offering where incident
response experts monitor and respond to security alerts in a SOC?
Cisco CloudLock
Cisco’s Active Threat Analytics (ATA)
Cisco Managed Firepower Service
Cisco Jasper
78. Which of the following is one of the main goals of data normalization?
79. Which of the following can be identified by correlating DNS intelligence and other
security events? (Choose two)
80. Which of the following steps in the kill chain would come before the others?
C2
Delivery
Installation
Exploitation
81. Which of the following are core responsibilities of a national CSIRT and CERT?
82. Which of the following is one of the main goals of the CSIRT?
83. Which of the following is not a metadata feature of the Diamond Model?
Direction
Result
Devices
Resources
84. Which of the following are the three metrics, or scores, of the CVSS?
Baseline
Base
Environmental
Temporal
85. Which of the following are not components of the 5-tuple of a flow in NetFlow?
(Choose two)
Source IP address
Flow record ID
Source port
Gateway
Destination port
86. Refer to the following packet capture. Which of the following statements is true?
Cisco PSIRT
Microsoft MSRC
CERT division of the SEI
FIRST
88. Which of the following is the team that handles the investigation, resolution, and
disclosure of security vulnerabilities in vendor products and services?
CSIRT
ICASI
USIRP
PSIRT
89. Which of the following are the three broad categories of cybersecurity investigations?
90. In addition to cybercrime and attacks, evidence found on a system or network may be
presented in a court of law to support accusations of crime or civil action, including which
of the following?
92. At which stage attacking the vulnerability belongs in Cyber kill chain?
Exploitation
93. Based on nistsp800-61R2 what are the recommended protections against malware?
94. Choose the option that best describes NIST data integrity
95. What is the process of remediation the system from attack so that responsible threat
actor can be revealed?
The current status of the incident (new, in progress, forwarded for investigation,
resolved, etc.)
A summary of the incident
Indicators related to the incident
Other incidents related to this incident
Actions taken by all incident handlers on this incident
Chain of custody, if applicable
Impact assessments related to the incident
Contact information for other involved parties (e.g., system owners, system
administrators)
A list of evidence gathered during the incident investigation
Comments from incident handlers
Next steps to be taken (e.g., rebuild the host, upgrade an application).
98. Which of the following is not an example of the VERIS main schema categories
Incident tracking
Victim demographics
Incident descriptions
Incident forensics ID
100. What is the difference between deterministic and probabilistic assessment method?