Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil CTIA 312-85 Questions and answers with ValidTests

Exam 312-85 All Questions
Exam 312-85 Premium Access

View all detail and faqs for the 312-85 exam

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.

Which of the following Google search queries should Moses use?

Options:

A.

related: www.infothech.org

B.

info: www.infothech.org

C.

link: www.infothech.org

D.

cache: www.infothech.org

Questions # 22:

Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.

Identify the type of data collection method used by Karry.

Options:

A.

Exploited data collection

B.

Active data collection

C.

Raw data collection

D.

Passive data collection

Questions # 23:

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

Options:

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

D.

Intelligence that reveals risks related to various strategic business decisions

Questions # 24:

A consortium was established in a collaborative effort to strengthen the cybersecurity posture of multiple organizations within an industry sector. The participating entities decided to adopt a threat intelligence exchange architecture in which all threat data is collected, analyzed, and disseminated through a single central hub.

What type of threat intelligence exchange architecture was implemented in this scenario?

Options:

A.

Decentralized exchange architecture

B.

Federated exchange architecture

C.

Hybrid exchange architecture

D.

Centralized exchange architecture

Questions # 25:

Marry wants to follow an iterative and incremental approach to prioritize requirements in order to protect the important assets of an organization against attacks. She wants to set the requirements based on the order of priority, where the most important requirement must be met first for a greater chance of success. She wants to apply prioritization tasks, scenarios, use cases, tests, and so on.

Which of the following methodologies should Marry use to prioritize the requirements?

Options:

A.

Data sampling

B.

MoSCoW

C.

Data visualization

D.

Fusion analysis

Questions # 26:

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

Options:

A.

Protection ranking

B.

Evaluating performance

C.

Data management

D.

Searchable functionality

Questions # 27:

An autonomous robot was deployed to navigate and learn about the environment. Through a trial-and-error process, the robot refines its actions based on positive or negative feedback to maximize cumulative rewards.

What type of machine learning will the robot employ in this scenario?

Options:

A.

Unsupervised learning

B.

Semi-supervised learning

C.

Reinforcement learning

D.

Supervised learning

Questions # 28:

Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.

What stage of ACH is Bob currently in?

Options:

A.

Diagnostics

B.

Evidence

C.

Inconsistency

D.

Refinement

Questions # 29:

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

Options:

A.

Red

B.

White

C.

Green

D.

Amber

Questions # 30:

Marie, a threat analyst at an organization named TechSavvy, was asked to perform operational threat intelligence analysis to get contextual information about security events and incidents.

Which of the following sources does Marie need to use to perform operational threat intelligence analysis?

Options:

A.

Attack group reports, attack campaign reports, incident reports, malware samples

B.

Malware indicators, network indicators, e-mail indicators

C.

Activity-related attacks, social media sources, chat room conversations

D.

OSINT, security industry white papers, human contacts

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions