Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

312-85 ECCouncil Certified Threat Intelligence Analyst (CTIA) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 312-85 Certified Threat Intelligence Analyst (CTIA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 2
Total 87 questions

Mario is working as an analyst in an XYZ organization in the United States. He has been asked to prepare a threat landscape report to provide in-depth awareness and greater insight into the threats his organization is facing.

Which of the following details should he include to prepare a threat landscape report?

A.

A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs

B.

Attribution of an attack to specific threat actor or group

C.

Attacker's motivation and intention behind the attack

D.

History of an attack and location where it was performed

An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.

Which of the following sources will help the analyst to collect the required intelligence?

A.

Active campaigns, attacks on other organizations, data feeds from external third parties

B.

OSINT, CTI vendors, ISAO/ISACs

C.

Campaign reports, malware, incident reports, attack group reports, human intelligence

D.

Human, social media, chat rooms

Tech Knights Inc., a small-scale company, has decided to share the intelligence information with various organizations using a nonprofit association that provides a secure place to accumulate and share the information about cyber threats in the industry, and it also provides an extended service of data analysis to the organizational network.

Which of the following types of sharing organizations should Tech Knights Inc. use to share information?

A.

Trading partners

B.

Information Sharing and Analysis Centers (ISACs)

C.

Informal contacts

D.

Commercial vendors

A threat analyst working in XYZ Company was asked to perform threat intelligence analysis. During the information collection phase, he used a social engineering technique where he pretended to be a legitimate or authorized person. Using this technique, he gathered sensitive information by scanning terminals for passwords, searching important documents on desks, rummaging bins, and so on.

Which of the following social engineering techniques was used by the analyst for information collection?

A.

Impersonation

B.

Shoulder surfing

C.

Piggybacking

D.

Dumpster diving

James, a senior threat intelligence officer, was tasked with assessing the success and failure of the threat intelligence program established by the organization. As part of the assessment, James reviewed the outcome of the intelligence program, determined if any improvements were required, and identified the past learnings that can be applied to future programs.

Identify the activity performed by James in the above scenario.

A.

Report findings and recommendations

B.

Determine the fulfillment of stakeholders

C.

Conduct a gap analysis

D.

Determine the costs and benefits associated with the program

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

A.

Red

B.

White

C.

Green

D.

Amber

Page: 2 / 2
Total 87 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved