New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-85 Exam - Topic 4 Question 5 Discussion

Actual exam question for Eccouncil's 312-85 exam
Question #: 5
Topic #: 4
[All 312-85 Questions]

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Evangelina
4 months ago
Are we sure about the sequence? Seems complicated!
upvoted 0 times
...
Tiara
4 months ago
Totally agree with D, it's the logical flow.
upvoted 0 times
...
Gwenn
4 months ago
Wait, why is WBS last? That seems off.
upvoted 0 times
...
Eun
4 months ago
I think option D makes the most sense.
upvoted 0 times
...
Cassie
5 months ago
Gotta start with the project charter!
upvoted 0 times
...
Corrinne
5 months ago
I’m a bit confused about the sequence. I thought defining activities was crucial before building the schedule, but I can't recall the exact order.
upvoted 0 times
...
Sharee
5 months ago
I remember practicing a similar question where we had to build a work breakdown structure early on. I feel like that might come before estimating resources.
upvoted 0 times
...
Felicidad
5 months ago
I think we start with reviewing the project charter, but I'm not sure if that comes before identifying deliverables or after.
upvoted 0 times
...
Kaitlyn
5 months ago
I believe the correct order is to first identify all deliverables and then define activities, but I’m not completely confident about that.
upvoted 0 times
...
Shalon
5 months ago
Ah, I see what they're getting at here. East-west traffic within a private cloud is critical to protect because that's where the majority of the sensitive data and application communication is happening. Gotta make sure that's locked down.
upvoted 0 times
...
Glenn
5 months ago
I'm leaning towards the 15-digit contact ID, but I'm not 100% confident. I'll make a note to review the Salesforce and Marketing Cloud integration documentation before answering.
upvoted 0 times
...

Save Cancel