livechat
期間限定特別サービス、15%割引キャンペーン実施中、02:23:55において終了。お得な割引コード:TOPJP2025
HACKER SAFEにより証明されたサイトは、99.9%以上のハッカー犯罪を防ぎます。
カート(0

CREST CPTIA 問題集

CPTIA

試験コード:CPTIA

試験名称:CREST Practitioner Threat Intelligence Analyst

最近更新時間:2025-08-19

問題と解答:全137問

CPTIA 無料でデモをダウンロード:

PDF版 Demo ソフト版 Demo オンライン版 Demo

追加した商品:"PDF版"
価格: ¥6599 

無料問題集CPTIA 資格取得

質問 1:
Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?
A. Installation
B. Reconnaissance
C. Exploitation
D. Weaponization
正解:D
解説: (Topexam メンバーにのみ表示されます)

質問 2:
During the vulnerability assessment phase, the incident responders perform various steps as below:
1. Run vulnerability scans using tools
2. Identify and prioritize vulnerabilities
3. Examine and evaluate physical security
4. Perform OSINT information gathering to validate the vulnerabilities
5. Apply business and technology context to scanner results
6. Check for misconfigurations and human errors
7. Create a vulnerability scan report
Identify the correct sequence of vulnerability assessment steps performed by the incident responders.
A. 4-->1-->2-->3-->6-->5-->7
B. 3-->6-->1-->2-->5-->4-->7
C. 2-->1-->4-->7-->5-->6-->3
D. 1-->3-->2-->4-->5-->6-->7
正解:A
解説: (Topexam メンバーにのみ表示されます)

質問 3:
What is the correct sequence of steps involved in scheduling a threat intelligence program?
1. Review the project charter
2. Identify all deliverables
3. Identify the sequence of activities
4. Identify task dependencies
5. Develop the final schedule
6. Estimate duration of each activity
7. Identify and estimate resources for all activities
8. Define all activities
9. Build a work breakdown structure (WBS)
A. 1-->2-->3-->4-->5-->6-->9-->8-->7
B. 1-->9-->2-->8-->3-->7-->4-->6-->5
C. 3-->4-->5-->2-->1-->9-->8-->7-->6
D. 1-->2-->3-->4-->5-->6-->7-->8-->9
正解:B
解説: (Topexam メンバーにのみ表示されます)

質問 4:
Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket submitted regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he performed incident analysis and validation to check whether the incident is a genuine incident or a false positive.
Identify the stage he is currently in.
A. Incident disclosure
B. Incident recording and assignment
C. Post-incident activities
D. Incident triage
正解:D
解説: (Topexam メンバーにのみ表示されます)

質問 5:
Your company sells SaaS, and your company itself is hosted in the cloud (using it as a PaaS). In case of a malware incident in your customer's database, who is responsible for eradicating the malicious software?
A. Building management
B. The customer
C. The PaaS provider
D. Your company
正解:D
解説: (Topexam メンバーにのみ表示されます)

質問 6:
A US Federal Agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to agency's reporting timeframe guidelines, this incident should be reported within 2 h of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the activity.
Which incident category of US Federal Agency does this incident belong to?
A. CAT 2
B. CAT 1
C. CAT 6
D. CAT 5
正解:A
解説: (Topexam メンバーにのみ表示されます)

質問 7:
Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling methodology where she performed the following stages:
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?
A. TRIKE
B. DREAD
C. OCTAVE
D. VAST
正解:C
解説: (Topexam メンバーにのみ表示されます)

質問 8:
Sam. an employee of a multinational company, sends emails to third-party organizations with a spoofed email address of his organization. How can you categorize this type of incident?
A. Unauthorized access incident.
B. Inappropriate usage incident
C. Denial-of-service incicent
D. Network intrusion incident
正解:B
解説: (Topexam メンバーにのみ表示されます)

連絡方法  
 support@topexam.jp サポート

試用版をダウンロード

人気のベンダー
Apple
Avaya
CIW
FileMaker
Lotus
Lpi
OMG
SNIA
Symantec
XML Master
Zend-Technologies
The Open Group
H3C
3COM
ACI
すべてのベンダー
TopExam問題集を選ぶ理由は何でしょうか?
 品質保証TopExamは我々の専門家たちの努力によって、過去の試験のデータが分析されて、数年以来の研究を通して開発されて、多年の研究への整理で、的中率が高くて99%の通過率を保証することができます。
 一年間の無料アップデートTopExamは弊社の商品をご購入になったお客様に一年間の無料更新サービスを提供することができ、行き届いたアフターサービスを提供します。弊社は毎日更新の情況を検査していて、もし商品が更新されたら、お客様に最新版をお送りいたします。お客様はその一年でずっと最新版を持っているのを保証します。
 全額返金弊社の商品に自信を持っているから、失敗したら全額で返金することを保証します。弊社の商品でお客様は試験に合格できると信じていますとはいえ、不幸で試験に失敗する場合には、弊社はお客様の支払ったお金を全額で返金するのを承諾します。(全額返金)
 ご購入の前の試用TopExamは無料なサンプルを提供します。弊社の商品に疑問を持っているなら、無料サンプルを体験することができます。このサンプルの利用を通して、お客様は弊社の商品に自信を持って、安心で試験を準備することができます。
a