Exam Details

  • Exam Code
    :312-85
  • Exam Name
    :Certified Threat Intelligence Analyst
  • Certification
    :ECCouncil Certification
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :49 Q&As
  • Last Updated
    :May 09, 2024

EC-COUNCIL ECCouncil Certification 312-85 Questions & Answers

  • Question 31:

    Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header. Connection status and content type Accept-ranges and last-modified information X-powered-by information Web server in use and its version Which of the following tools should the Tyrion use to view header content?

    A. Hydra

    B. AutoShun

    C. Vanguard enforcer

    D. Burp suite

  • Question 32:

    Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization. Which of the following are the needs of a RedTeam?

    A. Intelligence related to increased attacks targeting a particular software or operating system vulnerability

    B. Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

    C. Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

    D. Intelligence that reveals risks related to various strategic business decisions

  • Question 33:

    Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

    Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

    A. Data collection through passive DNS monitoring

    B. Data collection through DNS interrogation

    C. Data collection through DNS zone transfer

    D. Data collection through dynamic DNS (DDNS)

  • Question 34:

    Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.

    Identify the type of threat intelligence consumer is Tracy.

    A. Tactical users

    B. Strategic users

    C. Operational users

    D. Technical users

  • Question 35:

    In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

    A. Distributed storage

    B. Object-based storage

    C. Centralized storage

    D. Cloud storage

  • Question 36:

    Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

    Which of the following online sources should Alice use to gather such information?

    A. Financial services

    B. Social network settings

    C. Hacking forums

    D. Job sites

  • Question 37:

    Alison, an analyst in an XYZ organization, wants to retrieve information about a company's website from the time of its inception as well as the removed information from the target website.

    What should Alison do to get the information he needs.

    A. Alison should use SmartWhois to extract the required website information.

    B. Alison should use https://archive.org to extract the required website information.

    C. Alison should run the Web Data Extractor tool to extract the required website information.

    D. Alison should recover cached pages of the website from the Google search engine cache to extract the required website information.

  • Question 38:

    In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

    A. Active online attack

    B. Zero-day attack

    C. Distributed network attack

    D. Advanced persistent attack

  • Question 39:

    An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.

    Which of the following sources will help the analyst to collect the required intelligence?

    A. Active campaigns, attacks on other organizations, data feeds from external third parties

    B. OSINT, CTI vendors, ISAO/ISACs

    C. Campaign reports, malware, incident reports, attack group reports, human intelligence

    D. Human, social media, chat rooms

  • Question 40:

    Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.

    Which of the following sharing platforms should be used by Kim?

    A. Cuckoo sandbox

    B. OmniPeek

    C. PortDroid network analysis

    D. Blueliv threat exchange network

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-85 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.