Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

100% Valid and Newest Version 312-85 Questions & Answers shared by Certleader

https://www.certleader.com/312-85-dumps.html (49 Q&As)

312-85 Dumps

Certified Threat Intelligence Analyst

https://www.certleader.com/312-85-dumps.html

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version 312-85 Questions & Answers shared by Certleader
https://www.certleader.com/312-85-dumps.html (49 Q&As)

NEW QUESTION 1
ABC is a well-established cyber-security company in the United States. The organization implemented the automation of tasks such as data enrichment and
indicator aggregation. They also joined various communities to increase their knowledge about the emerging threats. However, the security teams can only detect
and prevent identified threats in a reactive approach.
Based on threat intelligence maturity model, identify the level of ABC to know the stage at which the
organization stands with its security and vulnerabilities.

A. Level 2: increasing CTI capabilities


B. Level 3: CTI program in place
C. Level 1: preparing for CTI
D. Level 0: vague where to start

Answer: A

NEW QUESTION 2
Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in
identification of installed malware in the network?

A. Repeater
B. Gateway
C. Hub
D. Network interface card (NIC)

Answer: B

NEW QUESTION 3
Sam works as an analyst in an organization named InfoTech Security. He was asked to collect information from various threat intelligence sources. In meeting the
deadline, he forgot to verify the threat intelligence sources and used data from an open-source data provider, who offered it at a very low cost. Through it was
beneficial at the initial stage but relying on such data providers can produce unreliable data and noise putting the organization network into risk.
What mistake Sam did that led to this situation?

A. Sam used unreliable intelligence sources.


B. Sam used data without context.
C. Sam did not use the proper standardization formats for representing threat data.
D. Sam did not use the proper technology to use or consume the information.

Answer: D

NEW QUESTION 4
Tim is working as an analyst in an ABC organization. His organization had been facing many challenges in converting the raw threat intelligence data into
meaningful contextual information. After inspection, he found that it was due to noise obtained from misrepresentation of data from huge data collections. Hence, it
is important to clean the data before performing data analysis using techniques such as data reduction. He needs to choose an appropriate threat intelligence
framework that automatically performs data collection, filtering, and analysis for his organization.
Which of the following threat intelligence frameworks should he choose to perform such task?

A. HighCharts
B. SIGVERIF
C. Threat grid
D. TC complete

Answer: D

NEW QUESTION 5
Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed
intrusion or attack over its target?

A. Nation-state attribution
B. True attribution
C. Campaign attribution
D. Intrusion-set attribution

Answer: B

NEW QUESTION 6
Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling
methodology where she performed the following stages:
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?

A. TRIKE
B. VAST
C. OCTAVE
D. DREAD

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version 312-85 Questions & Answers shared by Certleader
https://www.certleader.com/312-85-dumps.html (49 Q&As)

Answer: C

NEW QUESTION 7
An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform
threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the
adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.
What stage of the threat modeling is Mr. Andrews currently in?

A. System modeling
B. Threat determination and identification
C. Threat profiling and attribution
D. Threat ranking

Answer: C

NEW QUESTION 8
Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts.
During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and
statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

A. Dissemination and integration


B. Planning and direction
C. Processing and exploitation
D. Analysis and production

Answer: A

NEW QUESTION 9
Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring,
he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from
locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.
Which of the following key indicators of compromise does this scenario present?

A. Unusual outbound network traffic


B. Unexpected patching of systems
C. Unusual activity through privileged user account
D. Geographical anomalies

Answer: C

NEW QUESTION 10
An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management
decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats,
details on the financial impact of various cyber-activities, and so on.
Which of the following sources will help the analyst to collect the required intelligence?

A. Active campaigns, attacks on other organizations, data feeds from external third parties
B. OSINT, CTI vendors, ISAO/ISACs
C. Campaign reports, malware, incident reports, attack group reports, human intelligence
D. Human, social media, chat rooms

Answer: B

NEW QUESTION 10
Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social
security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the
information on the black market to make money.
Daniel comes under which of the following types of threat actor.

A. Industrial spies
B. State-sponsored hackers
C. Insider threat
D. Organized hackers

Answer: D

NEW QUESTION 15
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi,
tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.

A. Operational threat intelligence analysis


B. Technical threat intelligence analysis
C. Strategic threat intelligence analysis
D. Tactical threat intelligence analysis

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version 312-85 Questions & Answers shared by Certleader
https://www.certleader.com/312-85-dumps.html (49 Q&As)

Answer: D

NEW QUESTION 20
Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique
to sort out the relevant and structured data from the large amounts of unstructured data.
Which of the following techniques was employed by Miley?

A. Sandboxing
B. Normalization
C. Data visualization
D. Convenience sampling

Answer: B

NEW QUESTION 24
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

A. Active online attack


B. Zero-day attack
C. Distributed network attack
D. Advanced persistent attack

Answer: B

NEW QUESTION 26
Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that
involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.
Identify the type data collection method used by the Karry.

A. Active data collection


B. Passive data collection
C. Exploited data collection
D. Raw data collection

Answer: B

NEW QUESTION 28
Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol
(TLP).
Which TLP color would you signify that information should be shared only within a particular community?

A. Red
B. White
C. Green
D. Amber

Answer: D

NEW QUESTION 33
In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm
their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising
multistep interactions with numerous representatives, either having or without any perfect relevant information.
Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

A. Game theory
B. Machine learning
C. Decision theory
D. Cognitive psychology

Answer: C

NEW QUESTION 38
A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful
information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.
Which of the following categories of threat information has he collected?

A. Advisories
B. Strategic reports
C. Detection indicators
D. Low-level data

Answer: C

NEW QUESTION 42
A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version 312-85 Questions & Answers shared by Certleader
https://www.certleader.com/312-85-dumps.html (49 Q&As)

data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information
stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and
gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack
experienced by the client organization.
Which of the following attacks is performed on the client organization?

A. DHCP attacks
B. MAC spoofing attack
C. Distributed Denial-of-Service (DDoS) attack
D. Bandwidth attack

Answer: C

NEW QUESTION 45
Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created
a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?

A. Reconnaissance
B. Installation
C. Weaponization
D. Exploitation

Answer: C

NEW QUESTION 48
Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced
Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

A. related: www.infothech.org
B. info: www.infothech.org
C. link: www.infothech.org
D. cache: www.infothech.org

Answer: A

NEW QUESTION 50
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He
acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?

A. Internal intelligence feeds


B. External intelligence feeds
C. CSV data feeds
D. Proactive surveillance feeds

Answer: A

NEW QUESTION 52
An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots.
In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?

A. DNS zone transfer


B. Dynamic DNS
C. DNS interrogation
D. Fast-Flux DNS

Answer: D

NEW QUESTION 54
......

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version 312-85 Questions & Answers shared by Certleader
https://www.certleader.com/312-85-dumps.html (49 Q&As)

Thank You for Trying Our Product

* 100% Pass or Money Back


All our products come with a 90-day Money Back Guarantee.
* One year free update
You can enjoy free update one year. 24x7 online support.
* Trusted by Millions
We currently serve more than 30,000,000 customers.
* Shop Securely
All transactions are protected by VeriSign!

100% Pass Your 312-85 Exam with Our Prep Materials Via below:

https://www.certleader.com/312-85-dumps.html

The Leader of IT Certification visit - https://www.certleader.com


Powered by TCPDF (www.tcpdf.org)

You might also like