Exam Details

  • Exam Code
    :312-85
  • Exam Name
    :Certified Threat Intelligence Analyst
  • Certification
    :ECCouncil Certification
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :49 Q&As
  • Last Updated
    :Apr 30, 2024

EC-COUNCIL ECCouncil Certification 312-85 Questions & Answers

  • Question 1:

    Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.

    Which of the following categories of threat intelligence feed was acquired by Jian?

    A. Internal intelligence feeds

    B. External intelligence feeds

    C. CSV data feeds

    D. Proactive surveillance feeds

  • Question 2:

    Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

    A. Repeater

    B. Gateway

    C. Hub

    D. Network interface card (NIC)

  • Question 3:

    Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target's network?

    A. Risk tolerance

    B. Timeliness

    C. Attack origination points

    D. Multiphased

  • Question 4:

    Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization's URL.

    Which of the following Google search queries should Moses use?

    A. related: www.infothech.org

    B. info: www.infothech.org

    C. link: www.infothech.org

    D. cache: www.infothech.org

  • Question 5:

    An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.

    Which of the following sources of intelligence did the analyst use to collect information?

    A. OPSEC

    B. ISAC

    C. OSINT

    D. SIGINT

  • Question 6:

    What is the correct sequence of steps involved in scheduling a threat intelligence program?

    1.

    Review the project charter

    2.

    Identify all deliverables

    3.

    Identify the sequence of activities

    4.

    Identify task dependencies

    5.

    Develop the final schedule

    6.

    Estimate duration of each activity

    7.

    Identify and estimate resources for all activities

    8.

    Define all activities

    9.

    Build a work breakdown structure (WBS)

    A. 1-->9-->2-->8-->3-->7-->4-->6-->5

    B. 3-->4-->5-->2-->1-->9-->8-->7-->6

    C. 1-->2-->3-->4-->5-->6-->9-->8-->7

    D. 1-->2-->3-->4-->5-->6-->7-->8-->9

  • Question 7:

    SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization's security.

    Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

    A. Search

    B. Open

    C. Workflow

    D. Scoring

  • Question 8:

    Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements. Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

    A. Understand frequency and impact of a threat

    B. Understand data reliability

    C. Develop a collection plan

    D. Produce actionable data

  • Question 9:

    Tim is working as an analyst in an ABC organization. His organization had been facing many challenges in converting the raw threat intelligence data into meaningful contextual information. After inspection, he found that it was due to noise obtained from misrepresentation of data from huge data collections. Hence, it is important to clean the data before performing data analysis using techniques such as data reduction. He needs to choose an appropriate threat intelligence framework that automatically performs data collection, filtering, and analysis for his organization.

    Which of the following threat intelligence frameworks should he choose to perform such task?

    A. HighCharts

    B. SIGVERIF

    C. Threat grid

    D. TC complete

  • Question 10:

    Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.

    Identify the type data collection method used by the Karry.

    A. Active data collection

    B. Passive data collection

    C. Exploited data collection

    D. Raw data collection

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-85 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.