Pass the ECCouncil CTIA 312-85 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s website from the time of its inception as well as the removed information from the target website.

What should Alison do to get the information he needs.

Options:

A.

Alison should use SmartWhois to extract the required website information.


B.

Alison should use https://archive.org to extract the required website information.


C.

Alison should run the Web Data Extractor tool to extract the required website information.


D.

Alison should recover cached pages of the website from the Google search engine cache to extract the required website information.


Expert Solution
Questions # 12:

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?

Options:

A.

Sandboxing


B.

Normalization


C.

Data visualization


D.

Convenience sampling


Expert Solution
Questions # 13:

Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

Options:

A.

Repeater


B.

Gateway


C.

Hub


D.

Network interface card (NIC)


Expert Solution
Questions # 14:

Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

Options:

A.

Risk tolerance


B.

Timeliness


C.

Attack origination points


D.

Multiphased


Expert Solution
Questions # 15:

In which of the following forms of bulk data collection are large amounts of data first collected from multiple sources in multiple formats and then processed to achieve threat intelligence?

Options:

A.

Structured form


B.

Hybrid form


C.

Production form


D.

Unstructured form


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions