Exam Details

  • Exam Code
    :312-85
  • Exam Name
    :Certified Threat Intelligence Analyst
  • Certification
    :ECCouncil Certification
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :49 Q&As
  • Last Updated
    :May 09, 2024

EC-COUNCIL ECCouncil Certification 312-85 Questions & Answers

  • Question 41:

    Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.

    Which of the following types of trust model is used by Garry to establish the trust?

    A. Mediated trust

    B. Mandated trust

    C. Direct historical trust

    D. Validated trust

  • Question 42:

    ABC is a well-established cyber-security company in the United States. The organization implemented the automation of tasks such as data enrichment and indicator aggregation. They also joined various communities to increase their knowledge about the emerging threats. However, the security teams can only detect and prevent identified threats in a reactive approach.

    Based on threat intelligence maturity model, identify the level of ABC to know the stage at which the organization stands with its security and vulnerabilities.

    A. Level 2: increasing CTI capabilities

    B. Level 3: CTI program in place

    C. Level 1: preparing for CTI

    D. Level 0: vague where to start

  • Question 43:

    In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.

    Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

    A. Game theory

    B. Machine learning

    C. Decision theory

    D. Cognitive psychology

  • Question 44:

    An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.

    Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers, graphics, and multimedia?

    A. The right time

    B. The right presentation

    C. The right order

    D. The right content

  • Question 45:

    A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.

    Which of the following attacks is performed on the client organization?

    A. DHCP attacks

    B. MAC spoofing attack

    C. Distributed Denial-of-Service (DDoS) attack

    D. Bandwidth attack

  • Question 46:

    A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware. Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

    A. Threat modelling

    B. Application decomposition and analysis (ADA)

    C. Analysis of competing hypotheses (ACH)

    D. Automated technical analysis

  • Question 47:

    An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.

    What stage of the threat modeling is Mr. Andrews currently in?

    A. System modeling

    B. Threat determination and identification

    C. Threat profiling and attribution

    D. Threat ranking

  • Question 48:

    HandP, Inc. is a small-scale organization that has decided to outsource the network security monitoring due to lack of resources in the organization. They are looking for the options where they can directly incorporate threat intelligence into their existing network defense solutions.

    Which of the following is the most cost-effective methods the organization can employ?

    A. Recruit the right talent

    B. Look for an individual within the organization

    C. Recruit data management solution provider

    D. Recruit managed security service providers (MSSP)

  • Question 49:

    Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.

    Which of the following types of threat intelligence was shared by Alice?

    A. Strategic threat intelligence

    B. Tactical threat intelligence

    C. Technical threat intelligence

    D. Operational threat intelligence

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-85 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.