Pass the ECCouncil CTIA 312-85 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.

Identify the type of threat intelligence analysis is performed by John.

Options:

A.

Operational threat intelligence analysis


B.

Technical threat intelligence analysis


C.

Strategic threat intelligence analysis


D.

Tactical threat intelligence analysis


Questions # 2:

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Options:

A.

Threat modelling


B.

Application decomposition and analysis (ADA)


C.

Analysis of competing hypotheses (ACH)


D.

Automated technical analysis


Questions # 3:

Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements.

Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

Options:

A.

Understand frequency and impact of a threat


B.

Understand data reliability


C.

Develop a collection plan


D.

Produce actionable data


Questions # 4:

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Options:

A.

Search


B.

Open


C.

Workflow


D.

Scoring


Questions # 5:

Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.

Which of the following sharing platforms should be used by Kim?

Options:

A.

Cuckoo sandbox


B.

OmniPeek


C.

PortDroid network analysis


D.

Blueliv threat exchange network


Questions # 6:

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

Options:

A.

Protection ranking


B.

Evaluating performance


C.

Data management


D.

Searchable functionality


Questions # 7:

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

Options:

A.

1-->9-->2-->8-->3-->7-->4-->6-->5


B.

3-->4-->5-->2-->1-->9-->8-->7-->6


C.

1-->2-->3-->4-->5-->6-->9-->8-->7


D.

1-->2-->3-->4-->5-->6-->7-->8-->9


Questions # 8:

Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.

Which of the following phases of cyber kill chain methodology is Jame executing?

Options:

A.

Reconnaissance


B.

Installation


C.

Weaponization


D.

Exploitation


Questions # 9:

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

Options:

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability


B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)


C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs


D.

Intelligence that reveals risks related to various strategic business decisions


Questions # 10:

Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.

Identify the type of threat intelligence consumer is Tracy.

Options:

A.

Tactical users


B.

Strategic users


C.

Operational users


D.

Technical users


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions