CREST Related Exams
CPTIA Exam
The CREST CPTIA exam covers:
The CREST CPTIA focuses on threat intelligence-profiling threat actors, analyzing data, and reporting findings. On the other hand, the CPIA exam centers on intrusion analysis—detecting network attacks, analyzing logs, and responding to incidents.
An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.
Which of the following sources of intelligence did the analyst use to collect information?
Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?
Jason is an incident handler dealing with malware incidents. He was asked to perform memory dump analysis in order to collect the information about the basic functionality of any program. As a part of his assignment, he needs to perform string search analysis to search for the malicious string that could determine harmful actions that a program
can perform. Which of the following string-searching tools Jason needs to use to do the intended task?