Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-85 Certified Threat Intelligence Analyst (CTIA) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-85 Practice Questions

Certified Threat Intelligence Analyst (CTIA)

Last Update 1 day ago
Total Questions : 87

Dive into our fully updated and stable 312-85 practice test platform, featuring all the latest CTIA exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CTIA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-85. Use this test to pinpoint which areas you need to focus your study on.

312-85 PDF

312-85 PDF (Printable)
$43.75
$124.99

312-85 Testing Engine

312-85 PDF (Printable)
$50.75
$144.99

312-85 PDF + Testing Engine

312-85 PDF (Printable)
$63.7
$181.99
Question # 11

Mario is working as an analyst in an XYZ organization in the United States. He has been asked to prepare a threat landscape report to provide in-depth awareness and greater insight into the threats his organization is facing.

Which of the following details should he include to prepare a threat landscape report?

Options:

A.  

A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs

B.  

Attribution of an attack to specific threat actor or group

C.  

Attacker's motivation and intention behind the attack

D.  

History of an attack and location where it was performed

Discussion 0
Question # 12

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

Options:

A.  

1-->9-->2-->8-->3-->7-->4-->6-->5

B.  

3-->4-->5-->2-->1-->9-->8-->7-->6

C.  

1-->2-->3-->4-->5-->6-->9-->8-->7

D.  

1-->2-->3-->4-->5-->6-->7-->8-->9

Discussion 0
Question # 13

Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.

What stage of ACH is Bob currently in?

Options:

A.  

Diagnostics

B.  

Evidence

C.  

Inconsistency

D.  

Refinement

Discussion 0
Question # 14

Jacob, a professional hacker, created an exact replica of an online shopping website. He copied the entire contents of the original website onto the local system that enables him to create a dummy spam website for performing social engineering attacks over the employees.

What type of technique did Jacob use for cloning the website?

Options:

A.  

Data sampling

B.  

Website mirroring

C.  

Tailgating

D.  

Social engineering

Discussion 0
Question # 15

Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements.

Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

Options:

A.  

Understand frequency and impact of a threat

B.  

Understand data reliability

C.  

Develop a collection plan

D.  

Produce actionable data

Discussion 0
Question # 16

Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring, he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.

Which of the following key indicators of compromise does this scenario present?

Options:

A.  

Unusual outbound network traffic

B.  

Unexpected patching of systems

C.  

Unusual activity through privileged user account

D.  

Geographical anomalies

Discussion 0
Question # 17

Henry, working as a threat analyst in an organization named MylesTech, wants to share gathered intelligence. He wants to share the intelligence with a broad range of communities that can be trusted more, but the sensitivity of information is less.

Which of the following tiers of the sharing model must be employed by Henry?

Options:

A.  

Private tier

B.  

Public tier

C.  

Targeted tier

D.  

Multitier

Discussion 0
Question # 18

Walter and Sons Company has faced major cyber attacks and lost confidential data. The company has decided to concentrate more on the security rather than other resources. Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to perform qualitative data analysis to extract useful information from collected bulk data.

Which of the following techniques will help Alice to perform qualitative data analysis?

Options:

A.  

Regression analysis, variance analysis, and so on

B.  

Numerical calculations, statistical modeling, measurement, research, and so on.

C.  

Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on

D.  

Finding links between data and discover threat-related information

Discussion 0
Question # 19

Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.

Identify the type data collection method used by the Karry.

Options:

A.  

Active data collection

B.  

Passive data collection

C.  

Exploited data collection

D.  

Raw data collection

Discussion 0
Question # 20

Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by comparing the project results with the original objectives by reviewing project charter. He is also reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable level of quality.

Identify the activity that Joe is performing to assess a TI program’s success or failure.

Options:

A.  

Determining the fulfillment of stakeholders

B.  

Identifying areas of further improvement

C.  

Determining the costs and benefits associated with the program

D.  

Conducting a gap analysis

Discussion 0
Get 312-85 dumps and pass your exam in 24 hours!

Free Exams Sample Questions