Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Threat Intelligence Analyst (CTIA)

Last Update 1 day ago Total Questions : 87

The Certified Threat Intelligence Analyst (CTIA) content is now fully updated, with all current exam questions added 1 day ago. Deciding to include 312-85 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 312-85 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 312-85 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Threat Intelligence Analyst (CTIA) practice test comfortably within the allotted time.

Question # 4

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?

A.

Jim should identify the attack at an initial stage by checking the content of the user agent field.

B.

Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.

C.

Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

D.

Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.

Question # 5

Mario is working as an analyst in an XYZ organization in the United States. He has been asked to prepare a threat landscape report to provide in-depth awareness and greater insight into the threats his organization is facing.

Which of the following details should he include to prepare a threat landscape report?

A.

A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs

B.

Attribution of an attack to specific threat actor or group

C.

Attacker ' s motivation and intention behind the attack

D.

History of an attack and location where it was performed

Question # 6

Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.

Identify the type of threat intelligence consumer is Tracy.

A.

Tactical users

B.

Strategic users

C.

Operational users

D.

Technical users

Question # 7

Bob is a threat intelligence analyst in Global Technologies Inc. While extracting threat intelligence, he identified that the organization is vulnerable to various application threats that can be exploited by attackers.

Which of the following are the possible application threats that have been identified by Bob?

A.

SQL injection and buffer overflow attack

B.

Man-in-the-middle attack and physical security attack

C.

DNS and ARP poisoning

D.

Footprinting and spoofing

Question # 8

Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.

What stage of ACH is Bob currently in?

A.

Diagnostics

B.

Evidence

C.

Inconsistency

D.

Refinement

Question # 9

Michael, a threat analyst at an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he started analyzing the information and understanding the nature of the threats.

What stage of cyber-threat intelligence is Michael currently in?

A.

Unknown unknowns

B.

Known unknowns

C.

Unknown knowns

D.

Known knowns

Question # 10

Marie, a threat analyst at an organization named TechSavvy, was asked to perform operational threat intelligence analysis to get contextual information about security events and incidents.

Which of the following sources does Marie need to use to perform operational threat intelligence analysis?

A.

Attack group reports, attack campaign reports, incident reports, malware samples

B.

Malware indicators, network indicators, e-mail indicators

C.

Activity-related attacks, social media sources, chat room conversations

D.

OSINT, security industry white papers, human contacts

Go to page: