Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 312-85 - Certified Threat Intelligence Analyst (CTIA)

Page: 2 / 3
Total 87 questions

Tim is working as an analyst in an ABC organization. His organization had been facing many challenges in converting the raw threat intelligence data into meaningful contextual information. After inspection, he found that it was due to noise obtained from misrepresentation of data from huge data collections. Hence, it is important to clean the data before performing data analysis using techniques such as data reduction. He needs to choose an appropriate threat intelligence framework that automatically performs data collection, filtering, and analysis for his organization.

Which of the following threat intelligence frameworks should he choose to perform such task?

A.

HighCharts

B.

SIGVERIF

C.

Threat grid

D.

TC complete

An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.

Which of the following sources will help the analyst to collect the required intelligence?

A.

Active campaigns, attacks on other organizations, data feeds from external third parties

B.

OSINT, CTI vendors, ISAO/ISACs

C.

Campaign reports, malware, incident reports, attack group reports, human intelligence

D.

Human, social media, chat rooms

An autonomous robot was deployed to navigate and learn about the environment. Through a trial-and-error process, the robot refines its actions based on positive or negative feedback to maximize cumulative rewards.

What type of machine learning will the robot employ in this scenario?

A.

Unsupervised learning

B.

Semi-supervised learning

C.

Reinforcement learning

D.

Supervised learning

Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.

Which of the following sharing platforms should be used by Kim?

A.

Cuckoo sandbox

B.

OmniPeek

C.

PortDroid network analysis

D.

Blueliv threat exchange network

Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.

Which of the following types of threat intelligence was shared by Alice?

A.

Strategic threat intelligence

B.

Tactical threat intelligence

C.

Technical threat intelligence

D.

Operational threat intelligence

Marie, a threat analyst at an organization named TechSavvy, was asked to perform operational threat intelligence analysis to get contextual information about security events and incidents.

Which of the following sources does Marie need to use to perform operational threat intelligence analysis?

A.

Attack group reports, attack campaign reports, incident reports, malware samples

B.

Malware indicators, network indicators, e-mail indicators

C.

Activity-related attacks, social media sources, chat room conversations

D.

OSINT, security industry white papers, human contacts

Mario is working as an analyst in an XYZ organization in the United States. He has been asked to prepare a threat landscape report to provide in-depth awareness and greater insight into the threats his organization is facing.

Which of the following details should he include to prepare a threat landscape report?

A.

A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs

B.

Attribution of an attack to specific threat actor or group

C.

Attacker's motivation and intention behind the attack

D.

History of an attack and location where it was performed

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

A.

1-->9-->2-->8-->3-->7-->4-->6-->5

B.

3-->4-->5-->2-->1-->9-->8-->7-->6

C.

1-->2-->3-->4-->5-->6-->9-->8-->7

D.

1-->2-->3-->4-->5-->6-->7-->8-->9

The cybersecurity team seeks to enhance its threat hunting capabilities in a large enterprise. They plan to search systematically and proactively for adversaries within their networks. What type of threat hunting approaches are they most likely to adopt, involving predefined processes, methodologies, and frameworks for their investigation?

A.

Situational threat hunting

B.

Structured threat hunting

C.

Entity-driven threat hunting

D.

Unstructured threat hunting

John, a threat intelligence analyst in CyberTech Company, was asked to obtain information that provides greater insight into the current cyber risks. To gather such information, John needs to find the answers to the following questions:

    Why the organization might be attacked?

    How the organization might be attacked?

    Who might be the intruders?Identify the type of security testing John is going to perform.

A.

White box testing

B.

Intelligence-led security testing

C.

Black box testing