March Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 312-85 Certified Threat Intelligence Analyst (CTIA) is now Stable and With Pass Result

312-85 Practice Exam Questions and Answers

Certified Threat Intelligence Analyst (CTIA)

Last Update 1 day ago
Total Questions : 49

312-85 is stable now with all latest exam questions are added 1 day ago. Just download our Full package and start your journey with ECCouncil Certified Threat Intelligence Analyst (CTIA) certification. All these ECCouncil 312-85 practice exam questions are real and verified by our Experts in the related industry fields.

312-85 PDF

312-85 PDF (Printable)
$48
$119.99

312-85 Testing Engine

312-85 PDF (Printable)
$56
$139.99

312-85 PDF + Testing Engine

312-85 PDF (Printable)
$70.8
$176.99
Question # 1

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?

Options:

A.  

Advisories

B.  

Strategic reports

C.  

Detection indicators

D.  

Low-level data

Discussion 0
Question # 2

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Options:

A.  

Search

B.  

Open

C.  

Workflow

D.  

Scoring

Discussion 0
Question # 3

Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

Options:

A.  

Risk tolerance

B.  

Timeliness

C.  

Attack origination points

D.  

Multiphased

Discussion 0
Question # 4

Walter and Sons Company has faced major cyber attacks and lost confidential data. The company has decided to concentrate more on the security rather than other resources. Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to perform qualitative data analysis to extract useful information from collected bulk data.

Which of the following techniques will help Alice to perform qualitative data analysis?

Options:

A.  

Regression analysis, variance analysis, and so on

B.  

Numerical calculations, statistical modeling, measurement, research, and so on.

C.  

Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on

D.  

Finding links between data and discover threat-related information

Discussion 0
Question # 5

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?

Options:

A.  

Jim should identify the attack at an initial stage by checking the content of the user agent field.

B.  

Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.

C.  

Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

D.  

Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.

Discussion 0
Question # 6

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.

Identify the type of threat intelligence analysis is performed by John.

Options:

A.  

Operational threat intelligence analysis

B.  

Technical threat intelligence analysis

C.  

Strategic threat intelligence analysis

D.  

Tactical threat intelligence analysis

Discussion 0
Question # 7

Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.

Identify the type data collection method used by the Karry.

Options:

A.  

Active data collection

B.  

Passive data collection

C.  

Exploited data collection

D.  

Raw data collection

Discussion 0
Get 312-85 dumps and pass your exam in 24 hours!

Free Exams Sample Questions