Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

312-85 ECCouncil Certified Threat Intelligence Analyst (CTIA) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 312-85 Certified Threat Intelligence Analyst (CTIA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 87 questions

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?

A.

Advisories

B.

Strategic reports

C.

Detection indicators

D.

Low-level data

Steve is working as an analyst for Highlanders & Co. While performing data analysis, he used a method in which he included a list of all activities required to complete the project, time, dependencies, and logical endpoints such as milestones to acquire information about the relationship between various activities and the period of the activities obtained.

Which of the following data analysis methods was used by Steve?

A.

Critical path analysis

B.

Timeline analysis

C.

Cone of plausibility

D.

Analogy analysis

In which of the following levels of the Threat Hunting Maturity Model (HMM) does an organization use threat intelligence to search for anomalies in the network, follow the latest threat reports gathered from open and closed sources, and use open-source tools for analysis?

A.

Level 2: Procedural

B.

Level 1: Minimal

C.

Level 4: Leading

D.

Level 3: Innovative

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?

A.

Jim should identify the attack at an initial stage by checking the content of the user agent field.

B.

Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.

C.

Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

D.

Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.

Henry, working as a threat analyst in an organization named MylesTech, wants to share gathered intelligence. He wants to share the intelligence with a broad range of communities that can be trusted more, but the sensitivity of information is less.

Which of the following tiers of the sharing model must be employed by Henry?

A.

Private tier

B.

Public tier

C.

Targeted tier

D.

Multitier

An organization, namely Highlander, Inc., decided to integrate threat intelligence into the incident response process for rapid detection and recovery from various security incidents.

In which of the following phases of the incident response management does the organization utilize operational and tactical threat intelligence to provide context to the alerts generated by various security mechanisms?

A.

Phase 1: Preplanning

B.

Phase 2: Event

C.

Phase 3: Incident

D.

Phase 4: Breach

Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements.

Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

A.

Understand frequency and impact of a threat

B.

Understand data reliability

C.

Develop a collection plan

D.

Produce actionable data

Michael, a threat analyst at an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he started analyzing the information and understanding the nature of the threats.

What stage of cyber-threat intelligence is Michael currently in?

A.

Unknown unknowns

B.

Known unknowns

C.

Unknown knowns

D.

Known knowns

Sean works as a threat intelligence analyst. He is assigned a project for information gathering on a client's network to find a potential threat. He started analysis and was trying to find out the company's internal URLs, looking for any information about the different departments and business units. He was unable to find any information.

What should Sean do to get the information he needs?

A.

Sean should use WayBackMachine in Archive.org to find the company's internal URLs

B.

Sean should use e-mail tracking tools such as EmailTrackerPro to find the company's internal URLs

C.

Sean should use website mirroring tools such as HTTrack Web Site Copier to find the company's internal URLs

D.

Sean should use online services such as netcraft.com to find the company's internal URLs

Which component of risk management involves evaluating and ranking risks based on their significance, allowing organizations to focus resources on addressing the most critical threats?

A.

Risk identification

B.

Risk prioritization

C.

Risk assessment

D.

Risk mitigation

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

D.

Intelligence that reveals risks related to various strategic business decisions

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

A.

Data collection through passive DNS monitoring

B.

Data collection through DNS interrogation

C.

Data collection through DNS zone transfer

D.

Data collection through dynamic DNS (DDNS)

Walter and Sons Company has faced major cyber attacks and lost confidential data. The company has decided to concentrate more on the security rather than other resources. Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to perform qualitative data analysis to extract useful information from collected bulk data.

Which of the following techniques will help Alice to perform qualitative data analysis?

A.

Regression analysis, variance analysis, and so on

B.

Numerical calculations, statistical modeling, measurement, research, and so on.

C.

Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on

D.

Finding links between data and discover threat-related information

As the CEO of a multinational corporation, you focus on making decisions that align with the organization's long-term goals and overall business strategies. What type of threat intelligence would be most valuable in guiding your decisions to enhance a company's resilience against emerging cyber threats?

A.

Operational threat intelligence

B.

Tactical threat intelligence

C.

Strategic threat intelligence

D.

Technical threat intelligence

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?

A.

Sandboxing

B.

Normalization

C.

Data visualization

D.

Convenience sampling

Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.

In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

A.

Dissemination and integration

B.

Planning and direction

C.

Processing and exploitation

D.

Analysis and production

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

A.

1-->9-->2-->8-->3-->7-->4-->6-->5

B.

3-->4-->5-->2-->1-->9-->8-->7-->6

C.

1-->2-->3-->4-->5-->6-->9-->8-->7

D.

1-->2-->3-->4-->5-->6-->7-->8-->9

Philip, a professional hacker, is planning to attack an organization. In order to collect information, he covertly collects information from the target person by maintaining a personal or other relationship with the target person.

Which of the following intelligence sources is used by Philip to collect information about the target organization?

A.

CHIS

B.

MASINT

C.

SOCMINT

D.

FISINT

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

A.

Threat modelling

B.

Application decomposition and analysis (ADA)

C.

Analysis of competing hypotheses (ACH)

D.

Automated technical analysis

H&P, Inc. is a small-scale organization that has decided to outsource the network security monitoring due to lack of resources in the organization. They are looking for the options where they can directly incorporate threat intelligence into their existing network defense solutions.

Which of the following is the most cost-effective methods the organization can employ?

A.

Recruit the right talent

B.

Look for an individual within the organization

C.

Recruit data management solution provider

D.

Recruit managed security service providers (MSSP)

Page: 1 / 2
Total 87 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved