CREST Practitioner Threat Intelligence Analyst CPTIA Question # 38 Topic 4 Discussion

CREST Practitioner Threat Intelligence Analyst CPTIA Question # 38 Topic 4 Discussion

CPTIA Exam Topic 4 Question 38 Discussion:
Question #: 38
Topic #: 4

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?


A.

Threat modelling


B.

Application decomposition and analysis (ADA)


C.

Analysis of competing hypotheses (ACH)


D.

Automated technical analysis


Get Premium CPTIA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.