Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Threat Intelligence Analyst (CTIA)

Last Update 17 hours ago Total Questions : 87

The Certified Threat Intelligence Analyst (CTIA) content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include 312-85 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 312-85 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 312-85 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Threat Intelligence Analyst (CTIA) practice test comfortably within the allotted time.

Question # 4

An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.

Which of the following sources of intelligence did the analyst use to collect information?

A.

OPSEC

B.

ISAC

C.

OSINT

D.

SIGINT

Question # 5

Organizations must choose the right threat intelligence platform to assess and leverage intelligence information, monitor multiple enforcement points, manage intelligence feeds, and select appropriate security for digital assets.

Which of the following key factors ensures that the threat intelligence platform offers a structured way to perform investigations on attacks by processing the threat intelligence and utilizing internal security controls to automate the detection process?

A.

Scoring

B.

Search

C.

Workflow

D.

Open

Question # 6

Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

A.

Repeater

B.

Gateway

C.

Hub

D.

Network interface card (NIC)

Question # 7

Marry wants to follow an iterative and incremental approach to prioritize requirements in order to protect the important assets of an organization against attacks. She wants to set the requirements based on the order of priority, where the most important requirement must be met first for a greater chance of success. She wants to apply prioritization tasks, scenarios, use cases, tests, and so on.

Which of the following methodologies should Marry use to prioritize the requirements?

A.

Data sampling

B.

MoSCoW

C.

Data visualization

D.

Fusion analysis

Question # 8

Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.

What stage of the cyber-threat intelligence is Michael currently in?

A.

Unknown unknowns

B.

Unknowns unknown

C.

Known unknowns

D.

Known knowns

Question # 9

Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.

Which of the following types of trust model is used by Garry to establish the trust?

A.

Mediated trust

B.

Mandated trust

C.

Direct historical trust

D.

Validated trust

Question # 10

Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling methodology where she performed the following stages:

Stage 1: Build asset-based threat profiles

Stage 2: Identify infrastructure vulnerabilities

Stage 3: Develop security strategy and plans

Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?

A.

TRIKE

B.

VAST

C.

OCTAVE

D.

DREAD

Go to page: