New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CTIA 312-85 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.

Which of the following categories of threat intelligence feed was acquired by Jian?

Options:

A.

Internal intelligence feeds


B.

External intelligence feeds


C.

CSV data feeds


D.

Proactive surveillance feeds


Expert Solution
Questions # 2:

Two cybersecurity teams from different organizations joined forces to combat a rapidly evolving malware campaign targeting their industry. They exchange real-time information about the attackers’ techniques, compromised systems, and immediate defensive actions. What type of threat intelligence sharing characterizes this collaboration?

Options:

A.

Sharing tactical threat intelligence


B.

Sharing operational threat intelligence


C.

Sharing strategic threat intelligence


D.

Sharing technical threat intelligence


Expert Solution
Questions # 3:

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Options:

A.

DNS zone transfer


B.

Dynamic DNS


C.

DNS interrogation


D.

Fast-Flux DNS


Expert Solution
Questions # 4:

Marie, a threat analyst at an organization named TechSavvy, was asked to perform operational threat intelligence analysis to get contextual information about security events and incidents.

Which of the following sources does Marie need to use to perform operational threat intelligence analysis?

Options:

A.

Attack group reports, attack campaign reports, incident reports, malware samples


B.

Malware indicators, network indicators, e-mail indicators


C.

Activity-related attacks, social media sources, chat room conversations


D.

OSINT, security industry white papers, human contacts


Expert Solution
Questions # 5:

Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.

What stage of the cyber-threat intelligence is Michael currently in?

Options:

A.

Unknown unknowns


B.

Unknowns unknown


C.

Known unknowns


D.

Known knowns


Expert Solution
Questions # 6:

Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.

Which of the following sharing platforms should be used by Kim?

Options:

A.

Cuckoo sandbox


B.

OmniPeek


C.

PortDroid network analysis


D.

Blueliv threat exchange network


Expert Solution
Questions # 7:

Jacob, a professional hacker, created an exact replica of an online shopping website. He copied the entire contents of the original website onto the local system that enables him to create a dummy spam website for performing social engineering attacks over the employees.

What type of technique did Jacob use for cloning the website?

Options:

A.

Data sampling


B.

Website mirroring


C.

Tailgating


D.

Social engineering


Expert Solution
Questions # 8:

ABC is a well-established cyber-security company in the United States. The organization implemented the automation of tasks such as data enrichment and indicator aggregation. They also joined various communities to increase their knowledge about the emerging threats. However, the security teams can only detect and prevent identified threats in a reactive approach.

Based on threat intelligence maturity model, identify the level of ABC to know the stage at which the organization stands with its security and vulnerabilities.

Options:

A.

Level 2: increasing CTI capabilities


B.

Level 3: CTI program in place


C.

Level 1: preparing for CTI


D.

Level 0: vague where to start


Expert Solution
Questions # 9:

Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.

Connection status and content type

Accept-ranges and last-modified information

X-powered-by information

Web server in use and its version

Which of the following tools should the Tyrion use to view header content?

Options:

A.

Hydra


B.

AutoShun


C.

Vanguard enforcer


D.

Burp suite


Expert Solution
Questions # 10:

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Options:

A.

Distributed storage


B.

Object-based storage


C.

Centralized storage


D.

Cloud storage


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions