Here you can find all the free questions related with Eccouncil Certified Threat Intelligence Analyst (312-85) exam. You can also find on this page links to recently updated premium files with which you can practice for actual Eccouncil Certified Threat Intelligence Analyst Exam. These premium versions are provided as 312-85 exam practice tests, both as desktop software and browser based application, you can use whatever suits your style. Feel free to try the Certified Threat Intelligence Analyst Exam premium files for free, Good luck with your Eccouncil Certified Threat Intelligence Analyst Exam.
Question No: 1
MultipleChoice
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary's information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.
Options
Answer DExplanation
Tactical threat intelligence analysis focuses on the immediate, technical indicators of threats, such as the tactics, techniques, and procedures (TTPs) used by adversaries, their communication channels, the tools and software they utilize, and their strategies for evading forensic analysis. This type of analysis is crucial for operational defenses and is used by security teams to adjust their defenses against current threats. Since John successfully extracted information related to the adversaries' modus operandi, tools, communication channels, and evasion strategies, he is performing tactical threat intelligence analysis. This differs from strategic and operational threat intelligence, which focus on broader trends and specific operations, respectively, and from technical threat intelligence, which deals with technical indicators like malware signatures and IPs.
Reference:
'Tactical Cyber Intelligence,' by Cyber Threat Intelligence Network, Inc.
'Intelligence-Driven Incident Response: Outwitting the Adversary,' by Scott J. Roberts and Rebekah Brown
Question No: 2
MultipleChoice
What is the correct sequence of steps involved in scheduling a threat intelligence program?
1. Review the project charter
2. Identify all deliverables
3. Identify the sequence of activities
4. Identify task dependencies
5. Develop the final schedule
6. Estimate duration of each activity
7. Identify and estimate resources for all activities
8. Define all activities
9. Build a work breakdown structure (WBS)
Options
Answer AExplanation
The correct sequence for scheduling a threat intelligence program involves starting with the foundational steps of defining the project scope and objectives, followed by detailed planning and scheduling of tasks. The sequence starts with reviewing the project charter (1) to understand the project's scope, objectives, and constraints. Next, building a Work Breakdown Structure (WBS) (9) helps in organizing the team's work into manageable sections. Identifying all deliverables (2) clarifies the project's outcomes. Defining all activities (8) involves listing the tasks required to produce the deliverables. Identifying the sequence of activities (3) and estimating resources (7) and task dependencies (4) sets the groundwork for scheduling. Estimating the duration of each activity (6) is critical before developing the final schedule (5), which combines all these elements into a comprehensive plan. This approach ensures a structured and methodical progression from project initiation to execution.
Reference:
'A Guide to the Project Management Body of Knowledge (PMBOK Guide),' Project Management Institute