312-85 经测试和批准的认证威胁情报分析师学习材料 [Q23-Q41]

10 月 27, 2022 0 条评论

给本帖评分

312-85 Tested & Approved Certified Threat Intelligence Analyst Study Materials

Validate your Skills with Updated Certified Threat Intelligence Analyst Exam Questions & Answers and Test Engine

问题 23
Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.
Which of the following online sources should Alice use to gather such information?

 
 
 
 

问题 24
In which of the following forms of bulk data collection are large amounts of data first collected from multiple sources in multiple formats and then processed to achieve threat intelligence?

 
 
 
 

问题 25
Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.
Connection status and content type
Accept-ranges and last-modified information
X-powered-by information
Web server in use and its version
Which of the following tools should the Tyrion use to view header content?

 
 
 
 

问题 26
Enrage Tech 公司聘请安全分析师 Enrique 进行威胁情报分析。在数据收集过程中,他使用了一种反间谍机制,即采用递归 DNS 服务器进行服务器间 DNS 通信,当任何名称服务器向递归 DNS 服务器发出请求时,递归 DNS 服务器会记录收到的响应。然后,它会复制记录的数据并将数据存储在中央数据库中。利用这些日志,他分析了通过 DNS 基础设施进行的恶意尝试。
恩里克在收集数据时使用了以下哪种网络反情报(CCI)收集技术?

 
 
 
 

问题 27
Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

 
 
 
 

问题 28
Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive dat a. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.
What should Jim do to detect the data staging before the hackers exfiltrate from the network?

 
 
 
 

问题 29
John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.
What phase of the advanced persistent threat lifecycle is John currently in?

 
 
 
 

问题 30
Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements.
Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

 
 
 
 

问题 31
一名分析员正在某客户机构进行威胁情报分析,在信息收集过程中,他从公开来源收集信息并进行分析,以获得丰富有用的情报。他使用的信息源主要用于国家安全、执法以及收集业务或战略决策所需的情报。
分析员使用了以下哪些情报来源来收集信息?

 
 
 
 

问题 32
In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

 
 
 
 

问题 33
Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.
Which of the following types of trust model is used by Garry to establish the trust?

 
 
 
 

问题 34
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?

 
 
 
 

问题 35
Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).
Which TLP color would you signify that information should be shared only within a particular community?

 
 
 
 

问题 36
An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.
Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers, graphics, and multimedia?

 
 
 
 

问题 37
An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.
Which of the following sources will help the analyst to collect the required intelligence?

 
 
 
 

问题 38
Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.
Which of the following techniques was employed by Miley?

 
 
 
 

问题 39
SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

 
 
 
 

问题 40
Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

 
 
 
 

问题 41
Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?

 
 
 
 

ECCouncil 312-85 Exam Syllabus Topics:

主题 详细信息
主题 1
  • Understanding Organization’s Current Threat Landscape
  • Reviewing Threat Intelligence Program
主题 2
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
主题 3
  • Overview of Threat Intelligence Integration
  • Overview of Threat Intelligence Reports
主题 4
  • Understanding Threat Intelligence Data Collection and Acquisition
  • Overview of Threat Intelligence Collection Management
议题 5
  • Overview of Threat Intelligence Lifecycle and Frameworks
  • Introduction to Threat Intelligence
主题 6
  • Cyber Threats and Kill Chain Methodology
  • Understanding Cyber Kill Chain
主题 7
  • Understanding Indicators of Compromise
  • Understanding Advanced Persistent Threats
主题 8
  • Overview of Threat Intelligence Sharing
  • Requirements, Planning, Direction, and Review
主题 9
  • Understanding Cyber Threat Intelligence
  • Understanding Intelligence
主题 10
  • Understanding Requirements Analysis
  • Building a Threat Intelligence Team

 

312-85 [Oct-2022] Newly Released] 312-85 Exam Questions For You To Pass: https://www.topexamcollection.com/312-85-vce-collection.html

         

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *

输入下图中的文字