1 / 11

EC-Council Certified Threat Intelligence Analyst (CTIA) 312-85 Dumps

Passcert provides the latest EC-Council Certified Threat Intelligence Analyst (CTIA) 312-85 Dumps which contain real questions and answers that are helpful for you to clear the Exam easily.

Download Presentation

EC-Council Certified Threat Intelligence Analyst (CTIA) 312-85 Dumps

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Free EC-Council 312-85 Practice Exam Q&As Certified Threat Intelligence Analyst Certified Threat Intelligence Analyst https://www.passcert.com/312-85.html

  2. Free 312-85 Practice Exam From Passcert for Your Best Preparation 1.Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL. Which of the following Google search queries should Moses use? A. related: www.infothech.org B. info: www.infothech.org C. link: www.infothech.org D. cache: www.infothech.org Answer: A

  3. Free 312-85 Practice Exam From Passcert for Your Best Preparation 2. An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making. Which of the following sources of intelligence did the analyst use to collect information? A. OPSEC B. ISAC C. OSINT D. SIGINT Answer: C

  4. Free 312-85 Practice Exam From Passcert for Your Best Preparation 3.Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements. Which of the following considerations must be employed by Henry to prioritize intelligence requirements? A. Understand frequency and impact of a threat B. Understand data reliability C. Develop a collection plan D. Produce actionable data Answer: A

  5. Free 312-85 Practice Exam From Passcert for Your Best Preparation 4. Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization. Identify the type data collection method used by the Karry. A. Active data collection B. Passive data collection C. Exploited data collection D. Raw data collection Answer: B

  6. Free 312-85 Practice Exam From Passcert for Your Best Preparation 5. During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries. Identify the type of threat intelligence analysis is performed by John. A. Operational threat intelligence analysis B. Technical threat intelligence analysis C. Strategic threat intelligence analysis D. Tactical threat intelligence analysis Answer: D

  7. Free 312-85 Practice Exam From Passcert for Your Best Preparation 6.Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target? A. Nation-state attribution B. True attribution C. Campaign attribution D. Intrusion-set attribution Answer: B

  8. Free 312-85 Practice Exam From Passcert for Your Best Preparation 7.Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods. In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working? A. Dissemination and integration B. Planning and direction C. Processing and exploitation D. Analysis and production Answer: A

  9. Free 312-85 Practice Exam From Passcert for Your Best Preparation 8.Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization. Which of the following are the needs of a RedTeam? A. Intelligence related to increased attacks targeting a particular software or operating system vulnerability B. Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs) C. Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs D. Intelligence that reveals risks related to various strategic business decisions Answer: B

  10. Free 312-85 Practice Exam From Passcert for Your Best Preparation 9.In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them? A. Active online attack B. Zero-day attack C. Distributed network attack D. Advanced persistent attack Answer: B

  11. Free 312-85 Practice Exam From Passcert for Your Best Preparation 10.A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware. Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use? A. Threat modelling B. Application decomposition and analysis (ADA) C. Analysis of competing hypotheses (ACH) D. Automated technical analysis Answer: C

More Related