ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 2 Topic 1 Discussion

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 2 Topic 1 Discussion

312-85 Exam Topic 1 Question 2 Discussion:
Question #: 2
Topic #: 1

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?


A.

Threat modelling


B.

Application decomposition and analysis (ADA)


C.

Analysis of competing hypotheses (ACH)


D.

Automated technical analysis


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.