Big Black Friday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ECCouncil 312-85 Certified Threat Intelligence Analyst (CTIA) Exam Practice Test

Page: 1 / 9
Total 87 questions

Certified Threat Intelligence Analyst (CTIA) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

Options:

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

D.

Intelligence that reveals risks related to various strategic business decisions

Question 2

Organizations must choose the right threat intelligence platform to assess and leverage intelligence information, monitor multiple enforcement points, manage intelligence feeds, and select appropriate security for digital assets.

Which of the following key factors ensures that the threat intelligence platform offers a structured way to perform investigations on attacks by processing the threat intelligence and utilizing internal security controls to automate the detection process?

Options:

A.

Scoring

B.

Search

C.

Workflow

D.

Open

Question 3

Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.

In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

Options:

A.

Dissemination and integration

B.

Planning and direction

C.

Processing and exploitation

D.

Analysis and production

Question 4

Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s website from the time of its inception as well as the removed information from the target website.

What should Alison do to get the information he needs.

Options:

A.

Alison should use SmartWhois to extract the required website information.

B.

Alison should use https://archive.org to extract the required website information.

C.

Alison should run the Web Data Extractor tool to extract the required website information.

D.

Alison should recover cached pages of the website from the Google search engine cache to extract the required website information.

Question 5

You are a Security Operations Center (SOC) analyst responsible for monitoring and safeguarding the organization’s network. During routine activities, you identify a potential vulnerability that can expose critical systems to exploitation. In what specific aspect of cybersecurity would you actively engage in when addressing and mitigating this vulnerability?

Options:

A.

Threat intelligence analysis

B.

Vulnerability management

C.

Security awareness training

D.

Incident response

Question 6

An autonomous robot was deployed to navigate and learn about the environment. Through a trial-and-error process, the robot refines its actions based on positive or negative feedback to maximize cumulative rewards.

What type of machine learning will the robot employ in this scenario?

Options:

A.

Unsupervised learning

B.

Semi-supervised learning

C.

Reinforcement learning

D.

Supervised learning

Question 7

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

Options:

A.

Nation-state attribution

B.

True attribution

C.

Campaign attribution

D.

Intrusion-set attribution

Question 8

A consortium was established in a collaborative effort to strengthen the cybersecurity posture of multiple organizations within an industry sector. The participating entities decided to adopt a threat intelligence exchange architecture in which all threat data is collected, analyzed, and disseminated through a single central hub.

What type of threat intelligence exchange architecture was implemented in this scenario?

Options:

A.

Decentralized exchange architecture

B.

Federated exchange architecture

C.

Hybrid exchange architecture

D.

Centralized exchange architecture

Question 9

Bob is a threat intelligence analyst in Global Technologies Inc. While extracting threat intelligence, he identified that the organization is vulnerable to various application threats that can be exploited by attackers.

Which of the following are the possible application threats that have been identified by Bob?

Options:

A.

SQL injection and buffer overflow attack

B.

Man-in-the-middle attack and physical security attack

C.

DNS and ARP poisoning

D.

Footprinting and spoofing

Question 10

H&P, Inc. is a small-scale organization that has decided to outsource the network security monitoring due to lack of resources in the organization. They are looking for the options where they can directly incorporate threat intelligence into their existing network defense solutions.

Which of the following is the most cost-effective methods the organization can employ?

Options:

A.

Recruit the right talent

B.

Look for an individual within the organization

C.

Recruit data management solution provider

D.

Recruit managed security service providers (MSSP)

Question 11

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Options:

A.

Threat modelling

B.

Application decomposition and analysis (ADA)

C.

Analysis of competing hypotheses (ACH)

D.

Automated technical analysis

Question 12

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Options:

A.

DNS zone transfer

B.

Dynamic DNS

C.

DNS interrogation

D.

Fast-Flux DNS

Question 13

An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.

What stage of the threat modeling is Mr. Andrews currently in?

Options:

A.

System modeling

B.

Threat determination and identification

C.

Threat profiling and attribution

D.

Threat ranking

Question 14

An organization, namely Highlander, Inc., decided to integrate threat intelligence into the incident response process for rapid detection and recovery from various security incidents.

In which of the following phases of the incident response management does the organization utilize operational and tactical threat intelligence to provide context to the alerts generated by various security mechanisms?

Options:

A.

Phase 1: Preplanning

B.

Phase 2: Event

C.

Phase 3: Incident

D.

Phase 4: Breach

Question 15

While analyzing a series of security incidents, you notice a pattern of attacks originating from specific geographical locations. To gain deeper insight into the spatial aspects of these threats, what contextualization method would you employ to understand the geographic origin and distribution of the attacks?

Options:

A.

Policy context

B.

Historical context

C.

Temporal context

D.

Spatial context

Question 16

Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.

Connection status and content type

Accept-ranges and last-modified information

X-powered-by information

Web server in use and its version

Which of the following tools should the Tyrion use to view header content?

Options:

A.

Hydra

B.

AutoShun

C.

Vanguard enforcer

D.

Burp suite

Question 17

James, a senior threat intelligence officer, was tasked with assessing the success and failure of the threat intelligence program established by the organization. As part of the assessment, James reviewed the outcome of the intelligence program, determined if any improvements were required, and identified the past learnings that can be applied to future programs.

Identify the activity performed by James in the above scenario.

Options:

A.

Report findings and recommendations

B.

Determine the fulfillment of stakeholders

C.

Conduct a gap analysis

D.

Determine the costs and benefits associated with the program

Question 18

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?

Options:

A.

Jim should identify the attack at an initial stage by checking the content of the user agent field.

B.

Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.

C.

Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

D.

Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.

Question 19

Jacob, a professional hacker, created an exact replica of an online shopping website. He copied the entire contents of the original website onto the local system that enables him to create a dummy spam website for performing social engineering attacks over the employees.

What type of technique did Jacob use for cloning the website?

Options:

A.

Data sampling

B.

Website mirroring

C.

Tailgating

D.

Social engineering

Question 20

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.

Data collection through passive DNS monitoring

B.

Data collection through DNS interrogation

C.

Data collection through DNS zone transfer

D.

Data collection through dynamic DNS (DDNS)

Question 21

Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by comparing the project results with the original objectives by reviewing project charter. He is also reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable level of quality.

Identify the activity that Joe is performing to assess a TI program’s success or failure.

Options:

A.

Determining the fulfillment of stakeholders

B.

Identifying areas of further improvement

C.

Determining the costs and benefits associated with the program

D.

Conducting a gap analysis

Question 22

The cybersecurity team seeks to enhance its threat hunting capabilities in a large enterprise. They plan to search systematically and proactively for adversaries within their networks. What type of threat hunting approaches are they most likely to adopt, involving predefined processes, methodologies, and frameworks for their investigation?

Options:

A.

Situational threat hunting

B.

Structured threat hunting

C.

Entity-driven threat hunting

D.

Unstructured threat hunting

Question 23

CalSoft is a large-scale organization that wants to establish a certain level of trust before sharing intelligence within the organization. As various departments in the organization share information frequently, they decided to use different trust models for different departments. In addition, the organization acts as a provider of threat intelligence to all connected members and organizations.

Which of the following organizational trust models should be used by CalSoft?

Options:

A.

Validated trust

B.

Mediated trust

C.

Mandated trust

D.

Hybrid trust

Question 24

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.

Which of the following Google search queries should Moses use?

Options:

A.

related: www.infothech.org

B.

info: www.infothech.org

C.

link: www.infothech.org

D.

cache: www.infothech.org

Question 25

Michael, a threat analyst at an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he started analyzing the information and understanding the nature of the threats.

What stage of cyber-threat intelligence is Michael currently in?

Options:

A.

Unknown unknowns

B.

Known unknowns

C.

Unknown knowns

D.

Known knowns

Question 26

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Options:

A.

Distributed storage

B.

Object-based storage

C.

Centralized storage

D.

Cloud storage

Page: 1 / 9
Total 87 questions