ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 1 Topic 1 Discussion

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 1 Topic 1 Discussion

312-85 Exam Topic 1 Question 1 Discussion:
Question #: 1
Topic #: 1

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.

Identify the type of threat intelligence analysis is performed by John.


A.

Operational threat intelligence analysis


B.

Technical threat intelligence analysis


C.

Strategic threat intelligence analysis


D.

Tactical threat intelligence analysis


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.