New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-85 Exam - Topic 9 Question 19 Discussion

Actual exam question for Eccouncil's 312-85 exam
Question #: 19
Topic #: 9
[All 312-85 Questions]

An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.

What stage of the threat modeling is Mr. Andrews currently in?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Tomoko
4 months ago
Isn't threat ranking the last step?
upvoted 0 times
...
Brice
4 months ago
Wait, how can we be sure he's in that stage?
upvoted 0 times
...
Veronika
4 months ago
Totally agree with Ollie!
upvoted 0 times
...
Serita
4 months ago
I think it's threat determination and identification.
upvoted 0 times
...
Ollie
4 months ago
Sounds like he's in threat profiling and attribution.
upvoted 0 times
...
Bernadine
5 months ago
I recall a practice question where we discussed the importance of understanding the threat actor's motives, which sounds like threat profiling and attribution to me.
upvoted 0 times
...
Mignon
5 months ago
I feel like the system modeling stage is more about understanding the system itself, so it can't be that. Could it be threat ranking instead?
upvoted 0 times
...
Gracia
5 months ago
I'm not entirely sure, but I remember something about threat determination and identification being the first step. Maybe he's still in that phase?
upvoted 0 times
...
Werner
5 months ago
I think Mr. Andrews is in the threat profiling and attribution stage since he's analyzing the adversary's behavior and motives.
upvoted 0 times
...
Dawne
5 months ago
Okay, I remember learning about Versa Secure SD-WAN in class. I think the key features are multitenancy and single-pane-of-glass management. I'll select those two options.
upvoted 0 times
...
Clemencia
5 months ago
Alright, I've got a strategy here. The core file name should follow the format in the config, using the process details provided. I'm pretty confident I can nail this one.
upvoted 0 times
...
Freeman
5 months ago
Hmm, I'm a bit unsure about this one. I think it might be B, but I'm not totally sure. I'll have to think it through carefully.
upvoted 0 times
...

Save Cancel