New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CTIA 312-85 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Jamie, an analyst, was asked to perform statistical data analysis on the acquired data. While performing the analysis, he used conditional probability methods to understand the data and build insights for response actions based on it.

What stage of the statistical data analysis is Jamie currently in?

Options:

A.

Data correlation


B.

Data classification


C.

Data preparation


D.

Data validation


Expert Solution
Questions # 12:

Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

Options:

A.

Risk tolerance


B.

Timeliness


C.

Attack origination points


D.

Multiphased


Expert Solution
Questions # 13:

An organization, namely Highlander, Inc., decided to integrate threat intelligence into the incident response process for rapid detection and recovery from various security incidents.

In which of the following phases of the incident response management does the organization utilize operational and tactical threat intelligence to provide context to the alerts generated by various security mechanisms?

Options:

A.

Phase 1: Preplanning


B.

Phase 2: Event


C.

Phase 3: Incident


D.

Phase 4: Breach


Expert Solution
Questions # 14:

You are a cybersecurity analyst working at a financial institution. An unusual pattern of financial transactions was detected, suggesting potential fraud or money laundering. What specific type of threat intelligence would you rely on to analyze these financial activities and identify potential risks?

Options:

A.

OSINT


B.

CHIS


C.

TECHINT


D.

FININT


Expert Solution
Questions # 15:

A threat analyst working in XYZ Company was asked to perform threat intelligence analysis. During the information collection phase, he used a social engineering technique where he pretended to be a legitimate or authorized person. Using this technique, he gathered sensitive information by scanning terminals for passwords, searching important documents on desks, rummaging bins, and so on.

Which of the following social engineering techniques was used by the analyst for information collection?

Options:

A.

Impersonation


B.

Shoulder surfing


C.

Piggybacking


D.

Dumpster diving


Expert Solution
Questions # 16:

What term describes the trust establishment process, wherein the first organization relies on a body of evidence presented to the second organization, and the level of trust is contingent upon the degree and quality of evidence provided by the initiating organization?

Options:

A.

Mandated trust


B.

Direct historical trust


C.

Validated trust


D.

Mediated trust


Expert Solution
Questions # 17:

In which of the following levels of the Threat Hunting Maturity Model (HMM) does an organization use threat intelligence to search for anomalies in the network, follow the latest threat reports gathered from open and closed sources, and use open-source tools for analysis?

Options:

A.

Level 2: Procedural


B.

Level 1: Minimal


C.

Level 4: Leading


D.

Level 3: Innovative


Expert Solution
Questions # 18:

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Options:

A.

Active online attack


B.

Zero-day attack


C.

Distributed network attack


D.

Advanced persistent attack


Expert Solution
Questions # 19:

An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.

Which of the following sources of intelligence did the analyst use to collect information?

Options:

A.

OPSEC


B.

ISAC


C.

OSINT


D.

SIGINT


Expert Solution
Questions # 20:

Steve is working as an analyst for Highlanders & Co. While performing data analysis, he used a method in which he included a list of all activities required to complete the project, time, dependencies, and logical endpoints such as milestones to acquire information about the relationship between various activities and the period of the activities obtained.

Which of the following data analysis methods was used by Steve?

Options:

A.

Critical path analysis


B.

Timeline analysis


C.

Cone of plausibility


D.

Analogy analysis


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions