1What is the primary goal of an incident response plan?
Explain Incident Response and Monitoring Concepts
Easy
A.To delete all logs to hide the incident from the public.
B.To minimize damage and restore normal operations as quickly as possible.
C.To punish the attackers who caused the incident.
D.To immediately purchase new security software.
Correct Answer: To minimize damage and restore normal operations as quickly as possible.
Explanation:
The main purpose of incident response is to manage the aftermath of a security breach or attack effectively, with the goal of limiting damage, reducing recovery time and costs, and preventing future incidents.
Incorrect! Try again.
2Which phase of the incident response lifecycle involves taking steps to prevent the incident from spreading?
Incident Response
Easy
A.Preparation
B.Post-Incident Activity
C.Containment
D.Detection & Analysis
Correct Answer: Containment
Explanation:
The Containment phase focuses on isolating the affected systems to prevent the security incident from causing further damage to other parts of the network or organization.
Incorrect! Try again.
3What is the primary purpose of maintaining a 'chain of custody' in digital forensics?
Digital Forensics
Easy
A.To encrypt the collected evidence.
B.To speed up the data analysis process.
C.To prove the integrity and handling of evidence.
D.To identify the attacker immediately.
Correct Answer: To prove the integrity and handling of evidence.
Explanation:
The chain of custody is a chronological documentation of the seizure, control, transfer, analysis, and disposition of evidence. It is crucial for proving in a legal setting that the evidence has not been tampered with.
Incorrect! Try again.
4Which of the following is a fundamental data source for security monitoring and incident investigation?
Data Sources
Easy
A.Marketing brochures
B.Company financial reports
C.System and network log files
D.Employee satisfaction surveys
Correct Answer: System and network log files
Explanation:
Log files from operating systems, applications, and network devices (like firewalls and routers) record events and activities, providing essential data for identifying and investigating security incidents.
Incorrect! Try again.
5What does the acronym SIEM stand for in the context of cybersecurity?
Alerting and Monitoring Tools
Easy
A.Security Incident and Emergency Management
B.System Information and Event Monitoring
C.Security Information and Event Management
D.System Incident and Emergency Malware
Correct Answer: Security Information and Event Management
Explanation:
A SIEM (Security Information and Event Management) system is a tool that collects, aggregates, and analyzes log data from various sources to provide real-time analysis of security alerts.
Incorrect! Try again.
6What is an 'Indicator of Compromise' (IoC)?
Analyze Indicators of Malicious Activity
Easy
A.A piece of evidence on a network or system that indicates a security breach has occurred.
B.A software that prevents all cyber attacks.
C.A report on a company's financial losses due to an attack.
D.A contract that guarantees 100% security.
Correct Answer: A piece of evidence on a network or system that indicates a security breach has occurred.
Explanation:
An IoC is a forensic artifact or piece of data, such as a strange file, a malicious IP address, or an unusual traffic pattern, that points to a potential intrusion or compromise.
Incorrect! Try again.
7A user receives an email demanding payment to unlock their files, which have all become inaccessible. This is a classic indicator of what type of malware attack?
Malware Attack Indicators
Easy
A.Virus
B.Adware
C.Spyware
D.Ransomware
Correct Answer: Ransomware
Explanation:
Ransomware is a type of malicious software that encrypts a victim's files and demands a ransom payment in exchange for the decryption key.
Incorrect! Try again.
8A sudden and massive increase in network traffic to a web server, causing it to become slow or unavailable, is an indicator of which type of attack?
Physical and Network Attack Indicators
Easy
A.Denial of Service (DoS)
B.Man-in-the-Middle
C.SQL Injection
D.Phishing
Correct Answer: Denial of Service (DoS)
Explanation:
A Denial of Service (DoS) attack aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
Incorrect! Try again.
9Seeing text like ' OR 1=1; -- in a web application's log for a user input field is a strong indicator of what kind of attack?
Application Attack Indicators
Easy
A.Cross-Site Scripting (XSS)
B.Denial of Service (DoS)
C.SQL Injection
D.Phishing
Correct Answer: SQL Injection
Explanation:
This specific syntax is a classic example of an SQL Injection attack, where an attacker attempts to manipulate the application's database queries to bypass security or extract data.
Incorrect! Try again.
10Which is the very first phase in a standard incident response plan?
Incident Response
Easy
A.Eradication
B.Containment
C.Preparation
D.Detection
Correct Answer: Preparation
Explanation:
The Preparation phase is the first step. It involves creating policies, procedures, and acquiring the necessary tools and training before any incident occurs to ensure the team is ready to respond.
Incorrect! Try again.
11What is the primary function of an Intrusion Detection System (IDS)?
Alerting and Monitoring Tools
Easy
A.To monitor network or system activities for malicious activity and report it.
B.To block all incoming network traffic.
C.To automatically delete suspicious emails.
D.To encrypt all data on a hard drive.
Correct Answer: To monitor network or system activities for malicious activity and report it.
Explanation:
An IDS is a monitoring system that detects suspicious activities or policy violations and generates alerts. It does not actively block the traffic, which is the role of an Intrusion Prevention System (IPS).
Incorrect! Try again.
12In digital forensics, what is the process of creating a bit-for-bit copy of a piece of digital media called?
Digital Forensics
Easy
A.Copying and Pasting
B.Archiving
C.Imaging
D.Summarizing
Correct Answer: Imaging
Explanation:
Imaging, or creating a forensic image, is the process of making an exact copy of a storage device. This is done to preserve the original evidence in its exact state while analysis is performed on the copy.
Incorrect! Try again.
13What type of information do firewall logs primarily provide to a security analyst?
Data Sources
Easy
A.A list of all software installed on a server.
B.User login and logout times on a specific computer.
C.Information about network traffic that was allowed or denied.
D.Which websites a user visited using a specific browser.
Correct Answer: Information about network traffic that was allowed or denied.
Explanation:
Firewall logs are records of the traffic that attempts to pass through the firewall, detailing source/destination IPs, ports, and whether the connection was permitted or blocked based on security rules.
Incorrect! Try again.
14If a user's computer suddenly has a new, unwanted browser toolbar and is constantly showing pop-up advertisements, it is likely infected with what?
Malware Attack Indicators
Easy
A.Ransomware
B.A boot sector virus
C.Adware or Spyware
D.A rootkit
Correct Answer: Adware or Spyware
Explanation:
Adware is designed to display advertisements on your computer, while spyware may secretly monitor your activity and install unwanted toolbars. Both are common causes of these symptoms.
Incorrect! Try again.
15Finding an unfamiliar device plugged into a network port in an office is an example of what?
Physical and Network Attack Indicators
Easy
A.A potential physical and network security breach.
B.An employee charging their phone.
C.A routine software update.
D.A standard network upgrade.
Correct Answer: A potential physical and network security breach.
Explanation:
An unauthorized device could be used to intercept network traffic, access internal resources, or introduce malware. It represents a breach of both physical security (unauthorized access) and network security.
Incorrect! Try again.
16What is the main purpose of security monitoring?
Explain Incident Response and Monitoring Concepts
Easy
A.To track employee productivity.
B.To continuously watch systems and networks for signs of security threats.
C.To manage the company's marketing budget.
D.To install new software on all computers.
Correct Answer: To continuously watch systems and networks for signs of security threats.
Explanation:
Security monitoring involves the ongoing collection and analysis of data to detect and respond to security threats in real-time or near-real-time, helping to identify incidents early.
Incorrect! Try again.
17What happens during the 'Post-Incident Activity' or 'Lessons Learned' phase of incident response?
Incident Response
Easy
A.The team erases all evidence of the incident.
B.The team identifies that an incident has occurred.
C.The team isolates the affected systems from the network.
D.The team analyzes the incident and their response to it to make improvements for the future.
Correct Answer: The team analyzes the incident and their response to it to make improvements for the future.
Explanation:
This final phase is crucial for improving future incident response efforts. It involves documenting the incident, understanding what went well and what didn't, and updating plans and procedures accordingly.
Incorrect! Try again.
18Which of the following would be considered a network-based Indicator of Compromise (IoC)?
Analyze Indicators of Malicious Activity
Easy
A.A user account being created at an unusual time.
B.Unusual outbound traffic to a known malicious IP address.
C.A new file with a strange name in the C:\Windows directory.
D.An antivirus program being disabled.
Correct Answer: Unusual outbound traffic to a known malicious IP address.
Explanation:
This is a network-based IoC because it relates to network communication patterns. The other options are host-based IoCs, as they relate to activities on a specific computer or system.
Incorrect! Try again.
19What does NetFlow data provide for security analysis?
Data Sources
Easy
A.The full content of every network packet.
B.The passwords used for every user login.
C.Metadata about network conversations (who talked to whom, for how long).
D.A copy of every email sent and received.
Correct Answer: Metadata about network conversations (who talked to whom, for how long).
Explanation:
NetFlow is a network protocol that collects IP traffic information. It provides high-level metadata about traffic flows, such as source/destination IPs, ports, and volume of data, without capturing the full content of the packets.
Incorrect! Try again.
20A large number of failed login attempts from a single IP address for a single user account is an indicator of what type of attack?
Application Attack Indicators
Easy
A.Brute-force attack
B.Phishing
C.Man-in-the-Middle
D.Cross-Site Scripting (XSS)
Correct Answer: Brute-force attack
Explanation:
A brute-force attack is a trial-and-error method used to obtain information such as a user password. A high volume of failed logins is a classic sign that an automated tool is attempting to guess the correct password.
Incorrect! Try again.
21An organization has detected an active data exfiltration event from a critical database server. According to the NIST incident response lifecycle, what is the most appropriate immediate action during the Containment, Eradication, & Recovery phase?
Incident Response
Medium
A.Conduct a full forensic analysis to identify the attacker's TTPs.
B.Disconnect the server from the network to stop the exfiltration.
C.Wipe the server and restore from the most recent backup.
D.Notify regulatory bodies and affected customers of the data breach.
Correct Answer: Disconnect the server from the network to stop the exfiltration.
Explanation:
The immediate priority in the containment phase is to stop the bleeding. Disconnecting the server from the network (segmentation) is a short-term containment strategy that immediately halts the unauthorized data transfer. Wiping and restoring is part of eradication and recovery, which comes after containment. Full forensic analysis happens concurrently but doesn't stop the immediate threat. Notification is a post-incident activity.
Incorrect! Try again.
22A forensic investigator is collecting evidence from a running server that is suspected of being compromised. According to the Order of Volatility, which of the following data types should be collected first?
Digital Forensics
Medium
A.CPU registers and cache.
B.Archived logs and backup tapes.
C.Network traffic and ARP cache.
D.Data from the hard disk drive.
Correct Answer: CPU registers and cache.
Explanation:
The Order of Volatility dictates collecting evidence from most volatile to least volatile. CPU registers and cache are the most volatile form of data, as they are constantly changing and will be lost upon power-off. Network state is next, followed by running processes, then data on disk, and finally archived data.
Incorrect! Try again.
23A Security Operations Center (SOC) analyst is writing a SIEM correlation rule to detect a potential brute-force attack. Which logic would be most effective for this purpose?
Alerting and Monitoring Tools
Medium
A.Alert if a single user account has more than 10 failed login attempts followed by 1 successful login from the same IP address within 5 minutes.
B.Alert every time a 'login failed' event is generated for an administrator account.
C.Alert if any user successfully logs in from an IP address geolocated in a foreign country.
D.Alert when network traffic from a single source exceeds 1 GB/hour.
Correct Answer: Alert if a single user account has more than 10 failed login attempts followed by 1 successful login from the same IP address within 5 minutes.
Explanation:
This rule specifically looks for a pattern characteristic of a successful brute-force attack: numerous failures followed by a success in a short time frame. The other options are either too broad (foreign IP), too noisy (single failed admin login), or unrelated to a brute-force attack (network traffic volume).
Incorrect! Try again.
24A network security analyst needs to investigate a report of slow network performance. They suspect a broadcast storm. Which data source would be most useful for reconstructing the exact sequence of packets and identifying the misconfigured device?
Data Sources
Medium
A.Full Packet Capture (PCAP) data from a network tap.
B.Syslog messages from all network servers.
C.NetFlow records from a core router.
D.Firewall logs showing allowed and denied connections.
Correct Answer: Full Packet Capture (PCAP) data from a network tap.
Explanation:
Full Packet Capture (PCAP) records the entire content of every packet, which is necessary to analyze the payload and headers to diagnose issues like broadcast storms. NetFlow provides high-level traffic metadata (source, destination, port, bytes) but not the packet contents. Firewall and syslog data would not provide the necessary Layer 2 detail to identify the source of a broadcast storm.
Incorrect! Try again.
25A system administrator notices that standard system utilities like ls and ps are producing unusual or incomplete results. Furthermore, files known to exist are not visible in directory listings, and network connections are not shown by netstat. These symptoms are classic indicators of what type of malware?
Malware Attack Indicators
Medium
A.Spyware
B.Adware
C.Ransomware
D.Rootkit
Correct Answer: Rootkit
Explanation:
A rootkit is a type of malware designed to hide its presence and the presence of other malware. It often achieves this by modifying core system utilities and functions (e.g., patching the kernel or replacing binaries like ls, ps, netstat) to lie to the user and administrator.
Incorrect! Try again.
26While monitoring network traffic, an analyst observes a large volume of TCP SYN packets directed at a single web server from many different source IPs. The server is responding with SYN-ACK packets, but it is not receiving the final ACK, causing its connection table to fill up. What attack is most likely occurring?
Physical and Network Attack Indicators
Medium
A.ARP Poisoning
B.SYN Flood (DDoS)
C.Man-in-the-Middle (MITM)
D.DNS Tunneling
Correct Answer: SYN Flood (DDoS)
Explanation:
This describes a classic SYN flood, a type of Denial-of-Service (DoS) attack. The attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic by leaving many connections in a 'half-open' state.
Incorrect! Try again.
27An analyst reviews a web server's access log and finds the following entry: GET /items/view.php?id=123%20OR%201=1. What type of attack should the analyst investigate?
Application Attack Indicators
Medium
A.Directory Traversal
B.Cross-Site Request Forgery (CSRF)
C.Cross-Site Scripting (XSS)
D.SQL Injection (SQLi)
Correct Answer: SQL Injection (SQLi)
Explanation:
The string %20OR%201=1 (URL encoded for ' OR 1=1') is a classic tautology used in SQL Injection attacks. The attacker is attempting to modify the backend SQL query to always evaluate to true, potentially bypassing authentication or retrieving all records from a database table.
Incorrect! Try again.
28What is the primary distinction between an Indicator of Compromise (IoC) and an Indicator of Attack (IoA)?
Explain Incident Response and Monitoring Concepts
Medium
A.IoCs are generated by firewalls, while IoAs are generated by antivirus software.
B.IoCs are post-breach evidence (what happened), while IoAs are real-time signs of an ongoing attack (what is happening).
C.IoCs are high-fidelity alerts, while IoAs are low-fidelity alerts that require correlation.
D.IoCs relate to network events, while IoAs relate to endpoint events.
Correct Answer: IoCs are post-breach evidence (what happened), while IoAs are real-time signs of an ongoing attack (what is happening).
Explanation:
IoCs are static, forensic artifacts that indicate a compromise has occurred (e.g., a malicious file hash, a C2 domain name). IoAs focus on the attacker's behavior and intentions, representing a sequence of actions that suggest an attack is in progress (e.g., PowerShell executing a command to download a file from the internet).
Incorrect! Try again.
29Why is it standard practice for a digital forensics investigator to create a cryptographic hash (e.g., SHA-256) of an evidence drive both before and after creating a forensic image?
Digital Forensics
Medium
A.To identify and remove any malware present on the original drive.
B.To encrypt the evidence drive for secure storage.
C.To prove that the imaging process did not alter the original evidence.
D.To compress the forensic image for more efficient storage.
Correct Answer: To prove that the imaging process did not alter the original evidence.
Explanation:
Hashing creates a unique digital fingerprint of the data. By hashing the source drive before imaging and then hashing the created image file, an investigator can prove their integrity. If the hashes match, it demonstrates that the copy is an exact, unaltered replica of the original, which is crucial for maintaining the chain of custody and admissibility in court.
Incorrect! Try again.
30During the 'Lessons Learned' meeting in the Post-Incident Activity phase, what is the primary goal for the incident response team?
Incident Response
Medium
A.To brief the executive leadership team on the successful containment of the threat.
B.To assign blame for the security failures that led to the incident.
C.To calculate the total financial cost of the incident for insurance purposes.
D.To identify gaps in security controls and update the incident response plan.
Correct Answer: To identify gaps in security controls and update the incident response plan.
Explanation:
The 'Lessons Learned' phase is a critical, blame-free review intended to improve future responses. The primary goal is to analyze what went well and what didn't, in order to strengthen security posture, refine procedures, and update the IR plan, thereby making the organization more resilient to future attacks.
Incorrect! Try again.
31An organization wants to proactively detect suspicious activities on its endpoints, such as a Microsoft Word process spawning a PowerShell command. Which security tool is specifically designed to provide this level of visibility and detection?
Alerting and Monitoring Tools
Medium
A.Network Access Control (NAC)
B.Endpoint Detection and Response (EDR)
C.Network Intrusion Detection System (NIDS)
D.Web Application Firewall (WAF)
Correct Answer: Endpoint Detection and Response (EDR)
Explanation:
EDR tools are designed to monitor endpoint and network events and record them in a central database for analysis. They excel at identifying anomalous behavior, such as unusual process creation chains (Word -> PowerShell), which are often indicative of fileless malware or advanced attacks that traditional antivirus might miss.
Incorrect! Try again.
32A security analyst correlates several events: 1) A user received a spear-phishing email. 2) A short time later, a PowerShell process was observed downloading a file. 3) The endpoint began communicating with a known command-and-control server. This sequence of events is best described as:
Analyze Indicators of Malicious Activity
Medium
A.A security policy violation.
B.A Distributed Denial of Service (DDoS) attack.
C.A vulnerability scan.
D.An attack chain or kill chain.
Correct Answer: An attack chain or kill chain.
Explanation:
This sequence demonstrates multiple stages of a typical cyber attack, often modeled by a framework like the Cyber Kill Chain. It starts with initial delivery (phishing), moves to exploitation/installation (PowerShell download), and then to command and control (C2 communication). Analyzing events as part of a chain provides more context than viewing them in isolation.
Incorrect! Try again.
33An analyst notices that their workstation's ARP table intermittently shows the MAC address for the default gateway changing to the MAC address of another workstation on the same subnet. This is a strong indicator of what type of attack?
Physical and Network Attack Indicators
Medium
A.MAC Flooding
B.IP Spoofing
C.DNS Hijacking
D.ARP Poisoning
Correct Answer: ARP Poisoning
Explanation:
ARP poisoning (or ARP spoofing) is an attack where a malicious actor sends falsified ARP messages over a local area network. This results in linking an attacker's MAC address with the IP address of a legitimate computer or server on the network, such as the default gateway. This allows the attacker to intercept, modify, or stop traffic.
Incorrect! Try again.
34Users are reporting that when they try to browse to legitimate websites, they are frequently redirected to malicious sites. A network analyst inspects DNS traffic and sees that DNS queries for google.com are being answered by an unauthorized internal server, not the configured external DNS server. This most likely indicates:
Malware Attack Indicators
Medium
A.A worm propagating across the local network.
B.DNS cache poisoning on the endpoints or a compromised local DNS server.
C.A distributed denial-of-service (DDoS) attack against the external DNS server.
D.A BGP hijacking attack affecting the entire internet.
Correct Answer: DNS cache poisoning on the endpoints or a compromised local DNS server.
Explanation:
The indicator that an unauthorized internal server is answering DNS queries points to a localized attack. The malware may have modified the hosts file on each machine, changed their DNS settings, or compromised the internal DNS server itself to redirect traffic. This is a common tactic for credential harvesting and malware delivery.
Incorrect! Try again.
35A web application's error log is filled with messages indicating that a user is attempting to access files such as ../../../../etc/passwd. This activity is a clear indicator of which type of attack?
Application Attack Indicators
Medium
A.XML External Entity (XXE) Injection
B.Directory Traversal
C.Buffer Overflow
D.Insecure Deserialization
Correct Answer: Directory Traversal
Explanation:
The ../ sequence is used in file systems to move up to a parent directory. Attackers use strings like ../../../../etc/passwd in an attempt to traverse outside of the web root directory and access sensitive system files. This is a classic Directory Traversal (or Path Traversal) attack.
Incorrect! Try again.
36A SOC needs to monitor user authentication behavior across multiple different systems (Windows, Linux, VPN, web apps) to detect credential stuffing attacks. Which data source would be the most effective to centralize and analyze for this purpose?
Data Sources
Medium
A.Web server access logs.
B.NetFlow data from network switches.
C.Endpoint process monitoring logs from an EDR tool.
D.Centralized authentication and security event logs.
Correct Answer: Centralized authentication and security event logs.
Explanation:
To detect credential stuffing, an analyst needs to see both failed and successful login attempts across many systems and applications. Centralizing authentication logs (like Windows Security Event Logs, Linux's auth.log, VPN logs, etc.) into a SIEM allows for correlation and detection of a high volume of failed logins across many accounts from a single source IP.
Incorrect! Try again.
37A company is developing its incident response plan and wants to establish clear criteria for when an event should be escalated to a full-blown incident. Which of the following would be the best criteria to trigger an incident declaration?
Incident Response
Medium
A.The detection of a port scan from an external IP address.
B.Any alert generated by the Intrusion Detection System (IDS).
C.When a single user reports they are unable to access a file share.
D.Evidence of unauthorized access to a system containing sensitive customer data.
Correct Answer: Evidence of unauthorized access to a system containing sensitive customer data.
Explanation:
An incident is typically defined as an event that poses a significant threat to business operations, data confidentiality, integrity, or availability. Unauthorized access to sensitive data meets this high-impact threshold. Port scans and single IDS alerts are common events that need investigation but are not automatically full incidents. A single user issue is likely a helpdesk ticket.
Incorrect! Try again.
38What is the primary purpose of maintaining a strict 'Chain of Custody' for a piece of digital evidence?
Digital Forensics
Medium
A.To document every person who handled the evidence, to ensure its integrity and admissibility in legal proceedings.
B.To create a timeline of the security incident for the management report.
C.To track the financial cost associated with the forensic investigation.
D.To provide a backup copy of the evidence in case the original is damaged.
Correct Answer: To document every person who handled the evidence, to ensure its integrity and admissibility in legal proceedings.
Explanation:
The Chain of Custody is a formal record that shows who collected the evidence, who handled it, when it was transferred, and where it was stored. This documentation is crucial to prove that the evidence has not been tampered with or altered from the time it was collected to the time it is presented in court, thereby ensuring its legal integrity.
Incorrect! Try again.
39What is a key advantage of a Security Orchestration, Automation, and Response (SOAR) platform over a traditional Security Information and Event Management (SIEM) system?
Alerting and Monitoring Tools
Medium
A.SOAR is the only tool capable of collecting logs from different sources.
B.SOAR provides long-term log storage and retention for compliance purposes.
C.SOAR can automate and coordinate response actions across multiple tools based on predefined playbooks.
D.SOAR focuses exclusively on network traffic analysis, while SIEM focuses on logs.
Correct Answer: SOAR can automate and coordinate response actions across multiple tools based on predefined playbooks.
Explanation:
While SIEMs excel at log aggregation, correlation, and alerting, SOAR platforms are designed to take the next step. They integrate with other security tools (like firewalls, EDR, etc.) to automate response workflows (playbooks), such as automatically isolating an endpoint or blocking a malicious IP, thereby reducing manual effort and response time.
Incorrect! Try again.
40A large enterprise has established a dedicated Computer Security Incident Response Team (CSIRT). What is the primary role of this team within the organization?
Explain Incident Response and Monitoring Concepts
Medium
A.To develop new software applications for the company.
B.To perform daily system administration tasks and patch management.
C.To conduct routine compliance audits against standards like PCI DSS and HIPAA.
D.To be the central point of coordination and expertise for responding to cybersecurity incidents.
Correct Answer: To be the central point of coordination and expertise for responding to cybersecurity incidents.
Explanation:
A CSIRT (or CIRT) is a specialized group responsible for the centralized management and coordination of incident response. Their duties include preparation (planning, tools), detection and analysis (monitoring), and containment, eradication, and recovery. They are the expert first responders for security events.
Incorrect! Try again.
41An incident response team is handling a sophisticated APT attack. During the 'Containment' phase (NIST SP 800-61), they discover the attacker has established persistence on a domain controller but is currently dormant. The 'Eradication' plan requires rebuilding the DC from a trusted source, which will cause a 4-hour outage for critical business services. Executive leadership is pushing to delay the rebuild to minimize business impact. What is the most defensible course of action for the IR lead?
Incident Response
Hard
A.Proceed with immediate eradication despite the outage, citing the risk of the APT reactivating and causing greater damage.
B.Isolate the DC from the network segments containing critical data, but leave it online to maintain authentication services for less sensitive systems.
C.Negotiate a shorter outage window with leadership by presenting a risk analysis that quantifies the potential financial loss of APT reactivation versus the quantified loss from the outage.
D.Implement additional monitoring on the compromised DC and delay eradication until a scheduled maintenance window, accepting the risk.
Correct Answer: Negotiate a shorter outage window with leadership by presenting a risk analysis that quantifies the potential financial loss of APT reactivation versus the quantified loss from the outage.
Explanation:
This is the hardest choice because it involves synthesis of technical risk and business communication. While immediate eradication (A) is technically sound, it ignores business context. Delaying (B) accepts undue risk. Partial isolation (C) is a weak containment strategy for an APT on a DC. The best approach (D) is to translate the technical risk into business terms (financial loss), allowing leadership to make an informed, risk-based decision. This demonstrates a mature incident response capability that integrates with the business.
Incorrect! Try again.
42During a forensic analysis of a Windows NTFS filesystem, an investigator examines the STANDARD_INFORMATION attribute for the same file has a file creation timestamp of 2023-10-26 14:45:00. What does this temporal anomaly most strongly indicate?
Digital Forensics
Hard
A.An anti-forensics technique known as 'timestomping' was used to alter the FILE_NAME timestamps were left unchanged.
B.The file was created on a different system with an incorrect clock and then copied to the target system.
C.The system clock was adjusted between the file's creation and when its metadata was written.
D.This is a normal artifact of the NTFS journaling process and does not indicate malicious activity.
Correct Answer: An anti-forensics technique known as 'timestomping' was used to alter the FILE_NAME timestamps were left unchanged.
Explanation:
The FILE_NAME attribute timestamps are less commonly known and harder to change, often requiring kernel-level access or specialized forensic tools. A significant discrepancy where the STANDARD_INFORMATION timestamp is a classic indicator of timestomping, an anti-forensics technique used by attackers to hide their activity.
Incorrect! Try again.
43A SOC needs to detect an advanced data exfiltration technique where a malicious actor is using DNS tunneling to send small chunks of encrypted data within TXT record queries for a domain they control (e.g., <encoded_data>.malicious.com). Which data source would be the most effective for reliably detecting and analyzing this specific threat?
Data Sources
Hard
A.NetFlow data showing high volumes of UDP port 53 traffic to the attacker's DNS server.
B.Zeek (formerly Bro) DNS logs or full packet captures that record the full content of DNS queries and responses.
C.Firewall logs showing a large number of allowed connections to the attacker's DNS server IP.
D.Web proxy logs, as they capture all HTTP/HTTPS traffic which may include DNS over HTTPS.
Correct Answer: Zeek (formerly Bro) DNS logs or full packet captures that record the full content of DNS queries and responses.
Explanation:
NetFlow (A) only provides metadata (IPs, ports, volume) and would not see the content of the queries. Firewall logs (B) similarly lack the necessary detail. Web proxy logs (C) are irrelevant if the malware is using standard DNS (UDP/53) and not DNS over HTTPS. The only way to detect this specific technique is by inspecting the actual subdomains being queried, which requires a data source like Zeek's dns.log or a full packet capture that records the full query content, not just the destination.
Incorrect! Try again.
44While analyzing a memory dump from a compromised server using Volatility, you identify a svchost.exe process whose parent process ID (PPID) does not correspond to the legitimate services.exe. Furthermore, this svchost.exe process has loaded wininet.dll and has an active network connection to a non-standard port on an external IP. This combination of indicators is most characteristic of what malware technique?
Malware Attack Indicators
Hard
A.A ransomware variant encrypting files in a background service.
B.A bootkit that has modified the kernel to launch processes.
C.A worm spreading via the SMB protocol, which legitimately uses svchost.exe.
D.Process hollowing or process injection, where malware has injected its code into a legitimate svchost.exe instance.
Correct Answer: Process hollowing or process injection, where malware has injected its code into a legitimate svchost.exe instance.
Explanation:
The key indicators are the incorrect parent process and the suspicious network activity. Legitimate svchost.exe instances are children of services.exe. An orphaned or incorrectly parented svchost.exe is a major red flag. When combined with networking libraries (wininet.dll) being loaded and active C2 connections, it strongly points to an attacker injecting their malicious code into a trusted system process to evade detection. This is a hallmark of process injection or hollowing.
Incorrect! Try again.
45An analyst observes the following alert: "A PowerShell process was launched with the command line arguments `-NoP -NonI -W Hidden -Exec Bypass -EncodedCommand [long base64 string]...". According to David J. Bianco's 'Pyramid of Pain', what level of indicator does this alert primarily represent?
Analyze Indicators of Malicious Activity
Hard
A.IP Addresses
B.Tools / TTPs
C.Hash Values
D.Network/Host Artifacts
Correct Answer: Tools / TTPs
Explanation:
While the activity generates artifacts (D), the core indicator is the behavior itself. The use of PowerShell with specific obfuscation and execution policy bypass flags (-NoP, -Exec Bypass, -EncodedCommand) is a well-known adversarial Technique, Tactic, and Procedure (TTP). Blocking a specific hash of the script would be easy for the attacker to change. Blocking the IP it connects to would be slightly harder. Detecting or blocking the behavioral pattern of using PowerShell in this manner (the TTP) causes the most 'pain' for the adversary, forcing them to fundamentally change their methods.
Incorrect! Try again.
46The security team for an e-commerce site notices that certain API search endpoints, which use a backend Elasticsearch cluster, experience catastrophic performance degradation when queries contain nested clauses and a high number of leading wildcard characters (e.g., *keyword*). Application performance monitoring shows CPU usage on the Elasticsearch nodes spiking to 100%, but no database errors are logged. This is a classic indicator of what type of attack?
Application Attack Indicators
Hard
A.Regular Expression Denial of Service (ReDoS)
B.Server-Side Request Forgery (SSRF)
C.Cross-Site Scripting (XSS) targeting the API
D.Time-based Blind SQL Injection
Correct Answer: Regular Expression Denial of Service (ReDoS)
Explanation:
This scenario describes a vulnerability that causes a denial of service due to how the backend processes a malicious query. Elasticsearch, and many other systems, can be vulnerable to inefficient query patterns, particularly with leading wildcards or complex regular expressions. An attacker who understands this can craft a simple-looking query that causes a 'catastrophic backtracking' scenario in the search engine, consuming all available CPU resources. This is a form of algorithmic complexity attack, often categorized under ReDoS, and it's an application-layer DoS, not a network-layer one.
Incorrect! Try again.
47Network monitoring reveals a slow, steady stream of ICMP Echo Reply packets originating from a database server and sent to a single external IP address. No corresponding ICMP Echo Requests are observed entering the network destined for that server. The payload size of the replies is consistently non-standard (e.g., 128 bytes) and appears to be random data. What is the most plausible explanation for this traffic?
Physical and Network Attack Indicators
Hard
A.A stateful firewall is malfunctioning and dropping inbound ICMP requests while allowing outbound replies.
B.The server is misconfigured and is stuck in a ping loop with an external host.
C.Data is being exfiltrated covertly using ICMP as a C2 channel, with the payload of the Echo Replies containing the stolen data.
D.This is normal traffic from a network monitoring tool checking the server's uptime.
Correct Answer: Data is being exfiltrated covertly using ICMP as a C2 channel, with the payload of the Echo Replies containing the stolen data.
Explanation:
Unsolicited ICMP Echo Replies are highly anomalous. Legitimate replies must be preceded by a request. Attackers can abuse the ICMP protocol for covert communication because it is often allowed through firewalls for diagnostic purposes. By crafting raw sockets, malware can generate Echo Reply packets and embed stolen data within the payload. The lack of corresponding requests is the key indicator that this is not legitimate ping traffic but a covert channel for data exfiltration.
Incorrect! Try again.
48A Security Orchestration, Automation, and Response (SOAR) platform is configured with a playbook that, upon receiving a 'Malware Detected' alert from an EDR, automatically isolates the host and submits the malware hash to a threat intelligence platform. However, the SOC is being overwhelmed by alerts for polymorphic malware, where every new infection has a unique hash, rendering the hash-submission step useless. What is the most effective enhancement to this SOAR playbook to provide more durable defense?
Alerting and Monitoring Tools
A.Modify the playbook to extract and submit the C2 domain or IP address from the EDR alert instead of the file hash.
B.Increase the severity score of the alert each time a new hash is detected to get more attention.
C.Integrate a sandbox to detonate the malware, but continue to only submit the hash of the original sample.
D.Add a step to automatically delete the detected file from all other workstations.
Correct Answer: Modify the playbook to extract and submit the C2 domain or IP address from the EDR alert instead of the file hash.
Explanation:
This question addresses the 'Pyramid of Pain' in an automation context. The file hash is a trivial indicator for an attacker to change, especially with polymorphic malware. The network indicator (C2 domain or IP address) is more costly for the attacker to change and provides a much more durable and effective indicator for blocking and further investigation. Automating the extraction and blocking of network IOCs is a significant improvement over chasing unique hashes.
Incorrect! Try again.
49An investigator is performing live response on a Linux system suspected of having a kernel-level rootkit. Which of the following forensic procedures would be the MOST reliable for uncovering evidence of such a rootkit?
Digital Forensics
Hard
A.Checking the contents of the /proc/modules and /sys/module directories for any unusually named kernel modules.
B.Acquiring a full memory dump of the live system and analyzing the System Call Table in memory against a known-good profile for that kernel version.
C.Running the chkrootkit and rkhunter tools directly on the suspect system.
D.Comparing the output of ls -al /bin on the suspect system with the output from a known-good system.
Correct Answer: Acquiring a full memory dump of the live system and analyzing the System Call Table in memory against a known-good profile for that kernel version.
Explanation:
A kernel-level rootkit operates at the highest privilege level and can intercept system calls to hide its presence. This means it can modify the output of tools like ls, chkrootkit, and ps (A, B) and can hide its own modules from listings like /proc/modules (D). These are unreliable because they trust the compromised kernel to report on itself. The most reliable method is to perform memory forensics (C). By analyzing a raw memory dump, the investigator can examine critical kernel structures like the System Call Table from an external, trusted environment. Any hooks or redirects pointing to unauthorized memory locations are definitive proof of a kernel-level compromise.
Incorrect! Try again.
50In the context of the SANS/PICERL incident response framework, what is a key strategic difference between the 'Containment' and 'Eradication' phases when dealing with a human-operated ransomware attack?
Incident Response
Hard
A.Containment is about blocking C2 IP addresses, while Eradication is about patching the vulnerability that was exploited.
B.Containment focuses on identifying all compromised hosts, while Eradication focuses on restoring from backups.
C.Containment is performed by the Tier 1 SOC analysts, while Eradication is exclusively handled by the digital forensics team.
D.Containment involves short-term actions to stop the immediate bleeding (e.g., isolating network segments), while Eradication involves removing all attacker artifacts, which may include rebuilding entire systems.
Correct Answer: Containment involves short-term actions to stop the immediate bleeding (e.g., isolating network segments), while Eradication involves removing all attacker artifacts, which may include rebuilding entire systems.
Explanation:
This question tests a nuanced understanding of IR phases. Containment is about stopping the attack from spreading right now. It's a tactical, immediate set of actions. Eradication is the strategic, deeper process of ensuring the adversary is completely removed from the environment. For human-operated ransomware, simple file deletion is not enough; the attackers have backdoors, compromised credentials, and persistence mechanisms. Eradication, therefore, isn't just about deleting the ransomware; it's about removing the human operator's entire foothold, which often necessitates rebuilding systems from a known-good state.
Incorrect! Try again.
51A security analyst is hunting for 'living-off-the-land' lateral movement activity, specifically the use of Windows Management Instrumentation (WMI) to execute commands on remote systems. To create a high-fidelity detection rule, which combination of data sources and correlated events would be most effective?
Data Sources
Hard
A.Windows Security Event ID 4624 (Logon Success) with Logon Type 3 (Network) on the destination host.
B.Correlation of a source host's process execution log (e.g., Sysmon Event ID 1) showing wmiprvse.exe spawning a process, with a destination host's Windows Security Event ID 4624 (Logon Type 3) from the source host's IP within a short time window.
C.Firewall logs showing traffic on TCP port 135 (RPC) between workstations.
D.Windows System Event logs on the source host showing WMI service start/stop events.
Correct Answer: Correlation of a source host's process execution log (e.g., Sysmon Event ID 1) showing wmiprvse.exe spawning a process, with a destination host's Windows Security Event ID 4624 (Logon Type 3) from the source host's IP within a short time window.
Explanation:
This requires synthesizing multiple data points for high fidelity. Option A is too generic; many legitimate services use RPC. Option B is also too generic; network logons are common. Option C is not specific enough. Option D provides the most robust evidence. It correlates the cause on the source machine (WMI process execution, captured by a tool like Sysmon) with the effect on the destination machine (a network logon from the source), creating a specific and reliable indicator of remote WMI-based execution, a common lateral movement technique.
Incorrect! Try again.
52A web application's login page suddenly begins responding with a generic HTTP 500 - Internal Server Error for any failed login attempt, whereas previously it gave specific 'Invalid Username' or 'Invalid Password' messages. Simultaneously, monitoring shows a spike in failed login attempts from a single IP address. This change in application behavior is a strong indicator of what?
Application Attack Indicators
Hard
A.An attacker successfully modified the application's source code to hide their tracks.
B.A brute-force password guessing attack that is overloading the authentication service.
C.The web application firewall (WAF) is misconfigured and is now blocking legitimate error messages.
D.An attacker is exploiting a user enumeration vulnerability and the application has been patched mid-attack, resulting in the new generic error.
Correct Answer: An attacker is exploiting a user enumeration vulnerability and the application has been patched mid-attack, resulting in the new generic error.
Explanation:
The original behavior (specific error messages) represents a classic user enumeration vulnerability. The sudden switch to a generic error message suggests a security fix has been deployed. The fact that this change occurred during a spike in failed logins indicates that the security team likely detected the enumeration attack in progress and deployed a patch to remediate the vulnerability. The attacker's activity revealed the flaw, which was then fixed, changing the indicator.
Incorrect! Try again.
53An EDR alert fires for rundll32.exe executing a command containing javascript:"..\mshtml,RunHTMLApplication ". The process also initiates a network connection to download a file with an .hta extension. This specific sequence is a well-known method for bypassing application controls and is a strong indicator of what type of fileless execution payload?
Malware Attack Indicators
Hard
A.A Java Drive-By-Download exploit.
B.An HTML Application (HTA) payload delivered by an initial dropper.
C.A malicious macro embedded in a Word document.
D.A PowerShell Empire stager.
Correct Answer: An HTML Application (HTA) payload delivered by an initial dropper.
Explanation:
The mshtml,RunHTMLApplication function is a specific way to execute HTML Applications (HTAs) using the legitimate Windows binary rundll32.exe. HTAs are files that can contain JScript or VBScript and run with the full permissions of the user, outside the browser sandbox. This technique is often used by malware droppers to execute a more robust second stage (the HTA file) in a 'fileless' manner (from the perspective of traditional AV that scans executables on disk), making it a powerful method for bypassing application whitelisting.
Incorrect! Try again.
54A security analyst correlates two pieces of information: 1) An EDR alert showing lsass.exe was accessed by powershell.exe on a server, and 2) A network alert for Kerberos TGS-REQ packets containing RC4-HMAC encrypted data originating from that same server. What specific credential theft technique, associated with the MITRE ATT&CK framework, do these combined indicators point to?
Analyze Indicators of Malicious Activity
Hard
A.Pass-the-Hash (PtH)
B.Golden Ticket (T1558.001)
C.Kerberoasting (T1558.003)
D.DCSync (T1003.006)
Correct Answer: Kerberoasting (T1558.003)
Explanation:
This requires synthesizing host and network indicators. Accessing lsass.exe is a common way to dump credentials or tickets from memory. The key piece is the network indicator: a Kerberos TGS-REQ (Ticket Granting Service Request) that specifically uses the weaker RC4-HMAC encryption. This is the hallmark of Kerberoasting. In this attack, an adversary requests a service ticket for a user account that has a Service Principal Name (SPN). Part of the ticket is encrypted with the service account's NTLM password hash. The attacker takes this ticket offline and uses brute-force cracking to recover the account's plaintext password.
Incorrect! Try again.
55A SIEM is configured with a rule to detect 5 failed logins followed by 1 successful login from the same IP for the same user within 1 minute. This rule is generating a high number of false positives from a sales department where users frequently mistype their passwords. Which of the following is the most effective tuning strategy to reduce false positives without significantly increasing the risk of missing a real brute-force attack?
Alerting and Monitoring Tools
Hard
A.Whitelist the IP range of the entire sales department.
B.Increase the threshold to 50 failed logins.
C.Decrease the time window from 1 minute to 10 seconds.
D.Modify the rule to only trigger if the successful login originates from a different geographic location or ASN than the failed logins.
Correct Answer: Modify the rule to only trigger if the successful login originates from a different geographic location or ASN than the failed logins.
Explanation:
Increasing the threshold (A) or decreasing the time window (D) makes it easier for a slow brute-force attack to go undetected. Whitelisting (B) a large group of users is risky as their accounts could be the source of a real attack. The most intelligent tuning method is to add context (C). A user legitimately mistyping their password will have both failed and successful logins from the same source. A credential stuffing or password spraying attack often involves failures from a botnet, followed by a successful login from the attacker's own machine. Correlating the login activity with contextual information like geolocation or ASN adds high-fidelity logic that filters out normal user behavior while still catching the more dangerous attack pattern.
Incorrect! Try again.
56A wireless intrusion detection system (WIDS) generates an alert for a 'deauthentication flood' attack targeting the corporate Wi-Fi network's main access point. Simultaneously, a new open Wi-Fi network with an SSID identical to the corporate one (e.g., 'CorpWifi') appears. What is the primary goal of this combined attack?
Physical and Network Attack Indicators
Hard
A.To identify weaknesses in the WPA2-PSK key by capturing the 4-way handshake from multiple devices.
B.To drain the battery life of connected mobile devices by forcing them to constantly re-authenticate.
C.To perform a denial-of-service attack to disrupt business operations.
D.To force legitimate users to disconnect from the corporate network and reconnect to the attacker's rogue AP for a man-in-the-middle attack.
Correct Answer: To force legitimate users to disconnect from the corporate network and reconnect to the attacker's rogue AP for a man-in-the-middle attack.
Explanation:
This describes a classic 'Evil Twin' attack. The deauthentication flood is not just a DoS; it's a tool to achieve a larger goal. By forcibly disconnecting legitimate users from the real access point, the attacker creates a frustrating situation where users will try to reconnect. Their devices will then see the attacker's rogue AP with the same name and may connect to it automatically or be tricked into connecting manually. Once connected to the evil twin, the attacker is in a man-in-the-middle position to intercept traffic, capture credentials, and launch further attacks.
Incorrect! Try again.
57Your company has just suffered a data breach where customer PII was exfiltrated by a known cybercrime group. Legal counsel has advised that you must preserve evidence for potential litigation and law enforcement investigation. However, the forensics team reports that the malware used by the attackers includes a logic bomb set to securely wipe the drives of all compromised servers in 24 hours. This presents a direct conflict between:
Incident Response
Hard
A.The Identification and Eradication phases of incident response.
B.Evidence preservation (for forensics) and incident containment (preventing further damage).
C.The principles of 'Order of Volatility' and 'Chain of Custody'.
D.Business continuity and cybersecurity insurance requirements.
Correct Answer: Evidence preservation (for forensics) and incident containment (preventing further damage).
Explanation:
This scenario creates a classic and difficult dilemma. The need to preserve evidence for legal and forensic purposes requires leaving the systems in their current state as much as possible for imaging and analysis. However, the active threat of the logic bomb requires immediate action (containment/eradication) to prevent the total loss of data and systems, which would destroy the very evidence that needs to be preserved. The IR team must make a critical decision on how to proceed, likely involving a rapid, forensically-sound acquisition of evidence before the logic bomb can detonate.
Incorrect! Try again.
58An examiner is analyzing a Windows memory dump and wants to find evidence of a fileless malware that was executed via reflective DLL injection. Which of the following Volatility plugin outputs would provide the most direct evidence of this specific technique?
Digital Forensics
Hard
A.pslist showing a process with a suspicious name.
B.malfind identifying injected code in a process's memory that has no corresponding module on disk and has PAGE_EXECUTE_READWRITE memory protection.
C.netscan showing an established connection from a legitimate process like explorer.exe.
D.dlllist showing all loaded DLLs for each process.
Correct Answer: malfind identifying injected code in a process's memory that has no corresponding module on disk and has PAGE_EXECUTE_READWRITE memory protection.
Explanation:
Reflective DLL injection is a technique where malware loads itself into the memory of another process without being written to disk first. Therefore, it will not appear in a traditional dlllist (C) because it wasn't loaded by the Windows loader. While pslist (A) and netscan (B) can provide supporting evidence, they don't prove the injection technique itself. The malfind plugin is specifically designed to find this type of activity. It scans memory for characteristics of injected code, such as pages with execute, read, and write permissions (RWX), and code that doesn't map back to a legitimate file on disk, which is the definition of reflectively loaded code.
Incorrect! Try again.
59A web application log shows a successful authenticated request from a user to the endpoint /api/v1/update_profile. The JSON body of the request contains the expected parameters: {"email": "user@example.com", "phone": "555-1234"}. However, a subsequent log entry from the same session shows another request to the same endpoint with the body: {"email": "user@example.com", "phone": "555-1234", "isAdmin": true}. The application accepted this request and the user was successfully elevated to an administrator. This indicates what specific type of application vulnerability?
Application Attack Indicators
Hard
A.Mass Assignment Vulnerability
B.Cross-Site Request Forgery (CSRF)
C.Server-Side Request Forgery (SSRF)
D.Insecure Direct Object Reference (IDOR)
Correct Answer: Mass Assignment Vulnerability
Explanation:
This is a textbook example of a Mass Assignment vulnerability. The application code is likely designed to automatically bind incoming HTTP parameters to variables or object properties. The developer did not anticipate that an attacker could add an extra parameter (isAdmin) to the request that corresponds to a sensitive, internal property of the user object model. By not using a whitelist of allowed parameters, the application blindly 'mass assigned' the malicious parameter, leading to a privilege escalation. It is not IDOR, CSRF, or SSRF.
Incorrect! Try again.
60A security analyst is investigating an alert and finds the following command executed on a domain controller: ntdsutil.exe 'ac i ntds' 'ifm' 'create full C:\temp' q q. This command, when successfully executed by a privileged user, is a strong Indicator of Attack (IoA) for which specific adversarial objective?
Analyze Indicators of Malicious Activity
Hard
A.Credential Access via offline dumping of the Active Directory database.
B.Lateral movement using WMI or PsExec.
C.Establishing persistence via a new service creation.
D.Disabling security tools and clearing event logs.
Correct Answer: Credential Access via offline dumping of the Active Directory database.
Explanation:
ntdsutil.exe is a legitimate Active Directory management tool. The ifm (Install From Media) subcommand is used to create a copy of the AD database (ntds.dit) for creating new domain controllers. However, attackers abuse this functionality to create an offline copy of the entire AD database. Once they have the ntds.dit file, they can take it to their own machine and use tools like Mimikatz to extract all the NTLM password hashes for all users in the domain. This is a primary technique for the Credential Access tactic in the MITRE ATT&CK framework.