Which of the following best describes an email issued as an attack medium, in which several messages are sent to a mailbox to cause overflow?
Your manager hands you several items of digital evidence and asks you to investigate them in the order of volatility. Which of the following is the MOST volatile?
Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used for further investigation of the incident. In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?
Which of the following is a volatile evidence collecting tool?
BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?
After a recent email attack, Harry is analyzing the incident to obtain important information related to the incident. While investigating the incident, he is trying to
extract information such as sender identity, mail server, sender’s IP address, location, and so on.
Which of the following tools Harry must use to perform this task?
Which of the following processes is referred to as an approach to respond to the
security incidents that occurred in an organization and enables the response team by
ensuring that they know exactly what process to follow in case of security incidents?
Which of the following is a standard framework that provides recommendations for implementing information security controls for organizations that initiate, implement, or maintain information security management systems (ISMSs)?
Marley was asked by his incident handling and response (IH&R) team lead to collect volatile datasuch as system information and network information present in the
registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
Clark is investigating a cybercrime at TechSoft Solutions. While investigating the case,
he needs to collect volatile information such as running services, their process IDs,
startmode, state, and status.
Which of the following commands will help Clark to collect such information from
running services?
Which of the following terms refers to vulnerable account management functions, including account update, recovery of forgotten or lost passwords, and password reset, that might weaken valid authentication schemes?
Rose is an incident-handling person and she is responsible for detecting and eliminating
any kind of scanning attempts over the network by any malicious threat actors. Rose
uses Wireshark tool to sniff the network and detect any malicious activities going on.
Which of the following Wireshark filters can be used by her to detect TCP Xmas scan
attempt by the attacker?
ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the incident, they concluded that the attack is an application-layer attack. Which of the following attacks did the attacker use?
Which of the following are malicious software programs that infect computers and corrupt or deletethe data on them?
In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?
Patrick is doing a cyber forensic investigation. He is in the process of collecting physical
evidence at the crime scene.
Which of the following elements he must consider while collecting physical evidence?
Adam is an incident handler who intends to use DBCC LOG command to analyze a database and retrieve the active transaction log files for the specified database. The syntax of DBCC LOG command is DBCC LOG(, ), where the output parameter specifies the level of information an incident handler wants to retrieve. If Adam wants to retrieve the full information on each operation along with the hex dump of a current transaction row, which of the following output parameters should Adam use?
Which of the following techniques helps incident handlers to detect man-in-the-middle attack by finding the new APs and trying to connect an already established channel,
even if the spoofed AP consists similar IP and MAC addresses as of the original AP?
Which one of the following is the correct flow of the stages in an incident handling and response (IH&R) process?
Bonney’s system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware
incident from spreading?
Otis is an incident handler working in an organization called Delmont. Recently, the organization faced several setbacks in business, whereby its revenues are decreasing. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found traces of an attack through which proprietary information was stolen from the enterprise network and passed onto their competitors. Which of the following information security incidents did Delmont face?
Rinni is an incident handler and she is performing memory dump analysis.
Which of following tools she can use in order to perform memory dump analysis?
Which of the following digital evidence temporarily stored on a digital device that
requires a constant power supply and is deleted if the power supply is interrupted?
Ikeo Corp, hired an incident response team to assess the enterprise security. As part of the incident handling and response process, the IR team is reviewing the current security policies implemented by the enterprise. The IR team finds that employees of the organization do not have any restrictions on Internet access: they are allowed to visit any site, download any application, and access a computer or network from a remote location. Considering this as the main security threat, the IR team plans to change this policy as it can be easily exploited by attackers. Which of the following security policies is the IR team planning to modify?
SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?
Which of the following does NOT reduce the success rate of SQL injection?
Eric who is an incident responder is working on developing incident-handling plans and
procedures. As part of this process, he is performing analysis on the organizational
network to generate a report and to develop policies based on the acquired results.
Which of the following tools will help him in analyzing network and its related traffic?
Chandler is a professional hacker who is targeting Technote organization. He wants to obtain important organizational information that is being transmitted between
different hierarchies. In the process, he is sniffing the data packets transmitted through the network and then analyzing them to gather packet details such as network, ports,
protocols, devices, issues in network transmission, and other network specifications. Which of the following tools Chandler must employ to perform packet analysis?
Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?
Which of the following is not called volatile data?
Which of the following is NOT a network forensic tool?
Which of the following is a technique used by attackers to make a message difficult to understand through the use of ambiguous language?
Mr. Smith is a lead incident responder of a small financial enterprise having few
branches in Australia. Recently, the company suffered a massive attack losing USD 5
million through an inter-banking system. After in-depth investigation on the case, it was
found out that the incident occurred because 6 months ago the attackers penetrated the
network through a minor vulnerability and maintained the access without any user
being aware of it. Then, he tried to delete users’ fingerprints and performed a lateral
movement to the computer of a person with privileges in the inter-banking system.
Finally, the attacker gained access and did fraudulent transactions.
Based on the above scenario, identify the most accurate kind of attack.
In which of the following types of fuzz testing strategies the new data will be generated
from scratch and the amount of data to be generated are predefined based on the
testing model?
An attacker after performing an attack decided to wipe evidences using artifact wiping techniques to evade forensic investigation. He applied magnetic field to the digital
media device, resulting in an entirely clean device of any previously stored data.
Identify the artifact wiping technique used by the attacker.
Which of the following is not a countermeasure to eradicate inappropriate usage
incidents?
Which of the following is an Inappropriate usage incident?
Which of the following is defined as the identification of the boundaries of an IT system along with the resources and information that constitute the system?
Shiela is working at night as an incident handler. During a shift, servers were affected by a massive cyberattack. After she classified and prioritized the incident, she must report the incident, obtain necessary permissions, and perform other incident response functions. What list should she check to notify other responsible personnel?
Tibson works as an incident responder for MNC based in Singapore. He is investigating
a web application security incident recently faced by the company. The attack is
performed on a MS SQL Server hosted by the company. In the detection and analysis
phase, he used regular expressions to analyze and detect SQL meta-characters that led
to SQL injection attack.
Identify the regular expression used by Tibson to detect SQL injection attack on MS
SQL Server.
Joseph is an incident handling and response (IH&R) team lead in Toro Network Solutions Company. As a part of IH&R process, Joseph alerted the service providers,
developers, and manufacturers about the affected resources.
Identify the stage of IH&R process Joseph is currently in.
Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?
Which of the following is a type of malicious code or software that appears legitimate but can take control of your computer?
Which of the following is the BEST method to prevent email incidents?
Drake is an incident handler in Dark CLoud Inc. He is intended to perform log analysis
in order to detect traces of malicious activities within the network infrastructure.
Which of the following tools Drake must employ in order to view logs in real time and
identify malware propagation within the network?
If the browser does not expire the session when the user fails to logout properly, which of the following OWASP Top 10 web vulnerabilities is caused?
Employee monitoring tools are mostly used by employers to find which of the following?
Which of the following encoding techniques replaces unusual ASCII characters with
"%" followed by the character’s two-digit ASCII code expressed in hexadecimal?
What is the most recent NIST standard for incident response?
Malicious downloads that result from malicious office documents being manipulated are caused by which of the following?