Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

CREST Updated CPTIA Exam Questions and Answers by inayah

Page: 5 / 9

CREST CPTIA Exam Overview :

Exam Name: CREST Practitioner Threat Intelligence Analyst
Exam Code: CPTIA Dumps
Vendor: CREST Certification: CREST Practitioner
Questions: 135 Q&A's Shared By: inayah
Question 20

James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.

Which of the following commands helps James in determining all the executable files for running processes?

Options:

A.

cate A &. time ,/t

B.

netstat -ab

C.

top

D.

doskey/history

Discussion
Question 21

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.

Data collection through passive DNS monitoring

B.

Data collection through DNS interrogation

C.

Data collection through DNS zone transfer

D.

Data collection through dynamic DNS (DDNS)

Discussion
Question 22

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.

Identify the type of threat intelligence analysis is performed by John.

Options:

A.

Operational threat intelligence analysis

B.

Technical threat intelligence analysis

C.

Strategic threat intelligence analysis

D.

Tactical threat intelligence analysis

Discussion
Question 23

In which of the following phases of the incident handling and response (IH&R) process is the identified security incidents analyzed, validated, categorized, and prioritized?

Options:

A.

Incident triage

B.

Incident recording and assignment

C.

Containment

D.

Notification

Discussion
Lennox
Something Special that they provide a comprehensive overview of the exam content. They cover all the important topics and concepts, so you can be confident that you are well-prepared for the test.
Aiza Jul 21, 2025
That makes sense. What makes Cramkey Dumps different from other study materials?
Josie
I just passed my certification exam using their dumps and I must say, I was thoroughly impressed.
Fatimah Jul 11, 2025
You’re right. The dumps were authentic and covered all the important topics. I felt confident going into the exam and it paid off.
Annabel
I recently used them for my exam and I passed it with excellent score. I am impressed.
Amirah Jul 7, 2025
I passed too. The questions I saw in the actual exam were exactly the same as the ones in the Cramkey Dumps. I was able to answer the questions confidently because I had already seen and studied them.
Miriam
Highly recommended Dumps. 100% authentic and reliable. Passed my exam with wonderful score.
Milan Jul 17, 2025
I see. Thanks for the information. I'll definitely keep Cramkey in mind for my next exam.
Page: 5 / 9

CPTIA
PDF

$36.75  $104.99

CPTIA Testing Engine

$43.75  $124.99

CPTIA PDF + Testing Engine

$57.75  $164.99