Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

312-85 Exam Dumps - ECCouncil CTIA Questions and Answers

Page: 1 / 3
Questions 4

Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

Options:

A.

Repeater

B.

Gateway

C.

Hub

D.

Network interface card (NIC)

Buy Now
Questions 5

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

Options:

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

D.

Intelligence that reveals risks related to various strategic business decisions

Buy Now
Questions 6

In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.

Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

Options:

A.

Game theory

B.

Machine learning

C.

Decision theory

D.

Cognitive psychology

Buy Now
Questions 7

Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.

Identify the type data collection method used by the Karry.

Options:

A.

Active data collection

B.

Passive data collection

C.

Exploited data collection

D.

Raw data collection

Buy Now
Page: 1 / 3
Exam Code: 312-85
Exam Name: Certified Threat Intelligence Analyst
Last Update: May 16, 2024
Questions: 50
312-85 pdf

312-85 PDF

$28  $80
312-85 Engine

312-85 Testing Engine

$33.25  $95
312-85 PDF + Engine

312-85 PDF + Testing Engine

$45.5  $130