New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-85 Exam - Topic 5 Question 32 Discussion

Actual exam question for Eccouncil's 312-85 exam
Question #: 32
Topic #: 5
[All 312-85 Questions]

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary's information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.

Identify the type of threat intelligence analysis is performed by John.

Show Suggested Answer Hide Answer
Suggested Answer: D

Tactical threat intelligence analysis focuses on the immediate, technical indicators of threats, such as the tactics, techniques, and procedures (TTPs) used by adversaries, their communication channels, the tools and software they utilize, and their strategies for evading forensic analysis. This type of analysis is crucial for operational defenses and is used by security teams to adjust their defenses against current threats. Since John successfully extracted information related to the adversaries' modus operandi, tools, communication channels, and evasion strategies, he is performing tactical threat intelligence analysis. This differs from strategic and operational threat intelligence, which focus on broader trends and specific operations, respectively, and from technical threat intelligence, which deals with technical indicators like malware signatures and IPs. Reference:

'Tactical Cyber Intelligence,' by Cyber Threat Intelligence Network, Inc.

'Intelligence-Driven Incident Response: Outwitting the Adversary,' by Scott J. Roberts and Rebekah Brown


Contribute your Thoughts:

0/2000 characters
Jerilyn
2 months ago
Definitely operational! Those details are key for that type.
upvoted 0 times
...
Georgeanna
2 months ago
I think it's tactical analysis, not operational.
upvoted 0 times
...
Shantell
3 months ago
Tools and methods point to operational, for sure!
upvoted 0 times
...
Ryan
3 months ago
Wait, how can we be sure it's operational? Seems a bit vague.
upvoted 0 times
...
Rebecka
3 months ago
Sounds like operational threat intelligence to me.
upvoted 0 times
...
Mariann
3 months ago
I keep mixing up the types, but I feel like this could also relate to technical intelligence since it involves tools and strategies.
upvoted 0 times
...
Talia
4 months ago
I practiced a question similar to this, and I believe it was about operational intelligence. That seems to fit John's analysis.
upvoted 0 times
...
Sherly
4 months ago
I'm not entirely sure, but I remember something about tactical intelligence being more about immediate actions. Could it be that?
upvoted 0 times
...
Ronnie
4 months ago
I think John is focusing on the operational aspects since he's looking at the adversary's methods and tools.
upvoted 0 times
...
Val
4 months ago
This is a tricky one. The details provided seem to cover a range of intelligence aspects, from operational to technical. I'll need to really analyze the differences between the options to make the right call here.
upvoted 0 times
...
Fausto
4 months ago
Okay, let's see. The question says John extracted information about the adversary's tactics, techniques, and procedures, which sounds like it could be either operational or tactical threat intelligence analysis. I'll need to review the definitions to determine the best fit.
upvoted 0 times
...
Lawanda
5 months ago
Hmm, I'm a bit unsure about this one. The question mentions Modus operandi, tools, communication channels, and forensics evasion strategies, but I'm not sure which type of analysis that corresponds to. I'll have to think it through carefully.
upvoted 0 times
...
Mozell
5 months ago
This seems like a straightforward question on threat intelligence analysis. I'm pretty confident I can identify the correct type based on the information provided.
upvoted 0 times
...
Chanel
7 months ago
Technical threat intelligence is where it's at! John's got the skills to keep us one step ahead of the bad guys. Bet he could outwit them in a game of cyber-chess, no problem.
upvoted 0 times
...
Chantell
7 months ago
I believe it could also be Tactical threat intelligence analysis, as John identified the adversary's Modus operandi and forensics evasion strategies.
upvoted 0 times
...
Joana
7 months ago
Ooh, technical threat intelligence, huh? John must be a real cyber-sleuth, digging up all those juicy details. I bet he's got a sixth sense for sniffing out those pesky adversaries.
upvoted 0 times
...
Olene
7 months ago
I agree with Valentine. John extracted information about tools and communication channels, which falls under Technical threat intelligence analysis.
upvoted 0 times
...
Ardella
7 months ago
I agree, this sounds like a textbook example of technical threat intelligence. John was able to gather valuable operational details about the adversary's modus operandi and techniques.
upvoted 0 times
Page
5 months ago
A) Operational threat intelligence analysis
upvoted 0 times
...
Jeanice
6 months ago
C) Strategic threat intelligence analysis
upvoted 0 times
...
Evangelina
6 months ago
B) Technical threat intelligence analysis
upvoted 0 times
...
Daren
7 months ago
A) Operational threat intelligence analysis
upvoted 0 times
...
...
Valentine
7 months ago
I think the type of threat intelligence analysis performed by John is Technical threat intelligence analysis.
upvoted 0 times
...
Hillary
7 months ago
Hmm, from the details provided, it seems like John performed a technical threat intelligence analysis. He extracted specific information about the adversary's tactics and tools.
upvoted 0 times
Afton
6 months ago
User 2: Yes, he probably focused on the specific details of the adversary's methods and tools.
upvoted 0 times
...
Quentin
7 months ago
User 1: John must have conducted a technical threat intelligence analysis.
upvoted 0 times
...
...

Save Cancel