New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-85 Exam Dumps - ECCouncil CTIA Questions and Answers

Question # 24

Sean works as a threat intelligence analyst. He is assigned a project for information gathering on a client's network to find a potential threat. He started analysis and was trying to find out the company's internal URLs, looking for any information about the different departments and business units. He was unable to find any information.

What should Sean do to get the information he needs?

Options:

A.

Sean should use WayBackMachine in Archive.org to find the company's internal URLs

B.

Sean should use e-mail tracking tools such as EmailTrackerPro to find the company's internal URLs

C.

Sean should use website mirroring tools such as HTTrack Web Site Copier to find the company's internal URLs

D.

Sean should use online services such as netcraft.com to find the company's internal URLs

Buy Now
Question # 25

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?

Options:

A.

Advisories

B.

Strategic reports

C.

Detection indicators

D.

Low-level data

Buy Now
Question # 26

Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.

What stage of ACH is Bob currently in?

Options:

A.

Diagnostics

B.

Evidence

C.

Inconsistency

D.

Refinement

Buy Now
Question # 27

Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.

Which of the following categories of threat intelligence feed was acquired by Jian?

Options:

A.

Internal intelligence feeds

B.

External intelligence feeds

C.

CSV data feeds

D.

Proactive surveillance feeds

Buy Now
Question # 28

An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.

Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers,

graphics, and multimedia?

Options:

A.

The right time

B.

The right presentation

C.

The right order

D.

The right content

Buy Now
Question # 29

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

Options:

A.

1-->9-->2-->8-->3-->7-->4-->6-->5

B.

3-->4-->5-->2-->1-->9-->8-->7-->6

C.

1-->2-->3-->4-->5-->6-->9-->8-->7

D.

1-->2-->3-->4-->5-->6-->7-->8-->9

Buy Now
Exam Code: 312-85
Exam Name: Certified Threat Intelligence Analyst (CTIA)
Last Update: Dec 25, 2025
Questions: 87
312-85 pdf

312-85 PDF

$25.5  $84.99
312-85 Engine

312-85 Testing Engine

$28.5  $94.99
312-85 PDF + Engine

312-85 PDF + Testing Engine

$40.5  $134.99