New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

312-85 Exam Dumps - Certified Threat Intelligence Analyst (CTIA)

Searching for workable clues to ace the ECCouncil 312-85 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 312-85 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.

Which of the following types of trust model is used by Garry to establish the trust?

A.

Mediated trust

B.

Mandated trust

C.

Direct historical trust

D.

Validated trust

Full Access
Question # 5

Two cybersecurity teams from different organizations joined forces to combat a rapidly evolving malware campaign targeting their industry. They exchange real-time information about the attackers’ techniques, compromised systems, and immediate defensive actions. What type of threat intelligence sharing characterizes this collaboration?

A.

Sharing tactical threat intelligence

B.

Sharing operational threat intelligence

C.

Sharing strategic threat intelligence

D.

Sharing technical threat intelligence

Full Access
Question # 6

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?

A.

Jim should identify the attack at an initial stage by checking the content of the user agent field.

B.

Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.

C.

Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

D.

Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.

Full Access
Question # 7

Kira works as a security analyst in an organization. She was asked to define and set up the requirements before collecting threat intelligence information. The requirements should focus on what must be collected in order to fulfil production intelligence.

Which of the following categories of threat intelligence requirements should Kira focus on?

A.

Production requirements

B.

Intelligence requirements

C.

Business requirements

D.

Collection requirements

Full Access
Question # 8

Tech Knights Inc., a small-scale company, has decided to share the intelligence information with various organizations using a nonprofit association that provides a secure place to accumulate and share the information about cyber threats in the industry, and it also provides an extended service of data analysis to the organizational network.

Which of the following types of sharing organizations should Tech Knights Inc. use to share information?

A.

Trading partners

B.

Information Sharing and Analysis Centers (ISACs)

C.

Informal contacts

D.

Commercial vendors

Full Access
Go to page: