Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

CREST Practitioner Threat Intelligence Analyst Question and Answers

CREST Practitioner Threat Intelligence Analyst

Last Update Sep 23, 2025
Total Questions : 135

We are offering FREE CPTIA CREST exam questions. All you do is to just go and sign up. Give your details, prepare CPTIA free exam questions and then go for complete pool of CREST Practitioner Threat Intelligence Analyst test questions that will help you more.

CPTIA pdf

CPTIA PDF

$42  $104.99
CPTIA Engine

CPTIA Testing Engine

$50  $124.99
CPTIA PDF + Engine

CPTIA PDF + Testing Engine

$66  $164.99
Questions 1

Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?

Options:

A.  

Vulnerability identification

B.  

Impact analysis

C.  

Likelihood analysis

D.  

System characterization

Discussion 0
Questions 2

Which of the following options describes common characteristics of phishing emails?

Options:

A.  

Written in French

B.  

Sent from friends or colleagues

C.  

Urgency, threatening, or promising subject lines

D.  

No BCC fields

Discussion 0
Questions 3

Eric works as an incident handler at Erinol software systems. He was assigned a task to protect the organization from any kind of DoS/DDoS attacks.

Which of the following tools can be used by Eric to achieve his objective?

Options:

A.  

Incapsula

B.  

Hydra

C.  

IDA

D.  

Wireshark

Discussion 0
Questions 4

Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To acccomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources (processor cache) to steal data (cryptographic key/plain text secrets) from the victim machine. Identify the type of attack Alice is performing in the above scenario.

Options:

A.  

Side channel attack

B.  

Service hijacking

C.  

SQL injection attack

D.  

Man-in-the-cloud attack

Discussion 0
Questions 5

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Options:

A.  

DNS zone transfer

B.  

Dynamic DNS

C.  

DNS interrogation

D.  

Fast-Flux DNS

Discussion 0
Questions 6

Which of the following tools helps incident handlers to view the file system, retrieve deleted data, perform timeline analysis, web artifacts, etc., during an incident response process?

Options:

A.  

Autopsy

B.  

netstat

C.  

Process Explorer

D.  

nblslal

Discussion 0
Questions 7

Smith employs various malware detection techniques to thoroughly examine the

network and its systems for suspicious and malicious malware files. Among all

techniques, which one involves analyzing the memory dumps or binary codes for the

traces of malware?

Options:

A.  

Live system

B.  

Dynamic analysis

C.  

Intrusion analysis

D.  

Static analysis

Discussion 0
Questions 8

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.  

Initial intrusion

B.  

Search and exfiltration

C.  

Expansion

D.  

Persistence

Discussion 0
Questions 9

Johnson an incident handler is working on a recent web application attack faced by the

organization. As part of this process, he performed data preprocessing in order to

analyzing and detecting the watering hole attack. He preprocessed the outbound

network traffic data collected from firewalls and proxy servers and started analyzing

the user activities within a certain time period to create time-ordered domain sequences

to perform further analysis on sequential patterns.

Identify the data-preprocessing step performed by Johnson.

Options:

A.  

Filtering invalid host names

B.  

Identifying unpopular domains

C.  

Host name normalization

D.  

User-specific sessionization

Discussion 0
Questions 10

Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. Heacquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.

Which of the following categories of threat intelligence feed was acquired by Jian?

Options:

A.  

Internal intelligence feeds

B.  

External intelligence feeds

C.  

CSV data feeds

D.  

Proactive surveillance feeds

Discussion 0
Questions 11

Which of the following types of digital evidence is temporarily stored in a digital device that requires constant power supply and is deleted if the power supply is interrupted?

Options:

A.  

Slack space

B.  

Process memory

C.  

Event logs

D.  

Swap file

Discussion 0
Questions 12

Eric works as a system administrator at ABC organization and previously granted several users with access privileges to the organizations systems with unlimited permissions. These privileged users could prospectively misuse their rights unintentionally, maliciously, or could be deceived by attackers that could trick them to perform malicious activities. Which of the following guidelines would help incident handlers eradicate insider attacks by privileged users?

Options:

A.  

Do not allow administrators to use unique accounts during the installation process

B.  

Do not enable default administrative accounts to ensure accountability

C.  

Do not control the access to administrator ano privileged users

D.  

Do not use encryption methods to prevent, administrators and privileged users from accessing backup tapes and sensitive information

Discussion 0
Questions 13

An attack on a network is BEST blocked using which of the following?

Options:

A.  

IPS device inline

B.  

HIPS

C.  

Web proxy

D.  

Load balancer

Discussion 0
Questions 14

Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

Options:

A.  

Repeater

B.  

Gateway

C.  

Hub

D.  

Network interface card (NIC)

Discussion 0
Questions 15

Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.

Which of the following types of threat intelligence was shared by Alice?

Options:

A.  

Strategic threat intelligence

B.  

Tactical threat intelligence

C.  

Technical threat intelligence

D.  

Operational threat intelligence

Discussion 0
Questions 16

A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?

Options:

A.  

On-prom installation

B.  

saaS

C.  

laaS

D.  

PaaS

Discussion 0
Questions 17

Which of the following port scanning techniques involves resetting the TCP connection

between client and server abruptly before completion of the three-way handshake

signals, making the connection half-open?

Options:

A.  

Null scan

B.  

Full connect scan

C.  

Stealth scan

D.  

Xmas scan

Discussion 0
Questions 18

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

Options:

A.  

Red

B.  

White

C.  

Green

D.  

Amber

Discussion 0
Questions 19

H&P, Inc. is a small-scale organization that has decided to outsource the network security monitoring due to lack of resources in the organization. They are looking for the options where they can directly incorporate threat intelligence into their existing network defense solutions.

Which of the following is the most cost-effective methods the organization can employ?

Options:

A.  

Recruit the right talent

B.  

Look for an individual within the organization

C.  

Recruit data management solution provider

D.  

Recruit managed security service providers (MSSP)

Discussion 0
Questions 20

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Options:

A.  

Search

B.  

Open

C.  

Workflow

D.  

Scoring

Discussion 0
Questions 21

If a hacker cannot find any other way to attack an organization, they can influence an employee or a disgruntled staff member. What type of threat is this?

Options:

A.  

Phishing attack

B.  

Insider attack

C.  

Footprinting

D.  

Identity theft

Discussion 0
Questions 22

Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.

Which of the following types of trust model is used by Garry to establish the trust?

Options:

A.  

Mediated trust

B.  

Mandated trust

C.  

Direct historical trust

D.  

Validated trust

Discussion 0
Questions 23

Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high-profile executives of the company. What type of phishing attack is this?

Options:

A.  

Pharming

B.  

Whaling

C.  

Puddle phishing

D.  

Spear phishing

Discussion 0
Questions 24

Eric is an incident responder and is working on developing incident-handling plans and procedures. As part of this process, he is performing an analysis on the organizational network to generate a report and develop policies based on the acquired results. Which of the following tools will help him in analyzing his network and the related traffic?

Options:

A.  

Whois

B.  

Burp Suite

C.  

FaceNiff

D.  

Wireshark

Discussion 0
Questions 25

Robert is an incident handler working for Xsecurity Inc. One day, his organization

faced a massive cyberattack and all the websites related to the organization went

offline. Robert was on duty during the incident and he was responsible to handle the

incident and maintain business continuity. He immediately restored the web application

service with the help of the existing backups.

According to the scenario, which of the following stages of incident handling and

response (IH&R) process does Robert performed?

Options:

A.  

Evidence gathering and forensics analysis

B.  

Eradication

C.  

Notification

D.  

Recovery

Discussion 0
Questions 26

Which stage of the incident response and handling process involves auditing the system and network log files?

Options:

A.  

Containment

B.  

Incident triage

C.  

Incident disclosure

D.  

Incident eradication

Discussion 0
Questions 27

Which of the following is not the responsibility of first responders?

Options:

A.  

Protecting the crime scene

B.  

Identifying the crime scene

C.  

Packaging and transporting the electronic evidence

D.  

Preserving temporary and fragile evidence and then shut down or reboot the victim’s computer

Discussion 0
Questions 28

Dan is a newly appointed information security professional in a renowned organization. He is supposed to follow multiple security strategies to eradicate malware incidents. Which of the following is not considered as a good practice for maintaining information security and eradicating malware incidents?

Options:

A.  

Do not download or execute applications from third-party sources

B.  

Do not click on web browser pop-up windows

C.  

Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on

D.  

Do not download or execute applications from trusted sources

Discussion 0
Questions 29

Michael is a part of the computer incident response team of a company. One of his responsibilities is to handle email incidents. The company receives an email from an unknown source, and one of the steps that he needs to take is to check the validity of the email. Which of the following tools should he use?

Options:

A.  

Zendio

B.  

Email Dossier

C.  

Yesware

D.  

G Suite Toolbox

Discussion 0
Questions 30

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.  

Cross-site scripting

B.  

Insecure direct object references

C.  

Cross-site request forgery

D.  

SQL injection

Discussion 0
Questions 31

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

Which of the following online sources should Alice use to gather such information?

Options:

A.  

Financial services

B.  

Social network settings

C.  

Hacking forums

D.  

Job sites

Discussion 0
Questions 32

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

Options:

A.  

Vulnerability assessment phase

B.  

Post-investigation phase

C.  

Pre-investigation phase

D.  

Investigation phas

Discussion 0
Questions 33

Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?

Options:

A.  

Denial of service (DoS) attack

B.  

Fraud and theft

C.  

Unauthorized access

D.  

Malicious code or insider threat attack

Discussion 0
Questions 34

A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.

Which of the following attacks is performed on the client organization?

Options:

A.  

DHCP attacks

B.  

MAC spoofing attack

C.  

Distributed Denial-of-Service (DDoS) attack

D.  

Bandwidth attack

Discussion 0
Questions 35

Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?

Options:

A.  

Malware

B.  

Bolen

C.  

Unvalidated redirects and forwards

D.  

SQL injection

Discussion 0
Questions 36

SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?

Options:

A.  

Private key infrastructure

B.  

Private key in for ma lion

C.  

Public key information

D.  

Public key infrastructure

Discussion 0
Questions 37

Employee monitoring tools are mostly used by employers to find which of the following?

Options:

A.  

Lost registry keys

B.  

Conspiracies

C.  

Malicious insider threats

D.  

Stolen credentials

Discussion 0
Questions 38

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?

Options:

A.  

Jim should identify the attack at an initial stage by checking the content of the user agent field.

B.  

Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.

C.  

Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

D.  

Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.

Discussion 0
Questions 39

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

Options:

A.  

Protection ranking

B.  

Evaluating performance

C.  

Data management

D.  

Searchable functionality

Discussion 0
Questions 40

Which of the following is not a countermeasure to eradicate cloud security incidents?

Options:

A.  

Patch the database vulnerabilities and improve the isolation mechanism

B.  

Remove the malware files and traces from the affected components

C.  

Check for data protection at both design and runtime

D.  

Disable security options such as two factor authentication and CAPTCHA

Discussion 0