Proper study guides for Rebirth EC-Council Certified Threat Intelligence Analyst certified begins with EC-Council 312-85 preparation products which designed to deliver the High value 312-85 questions by making you pass the 312-85 test at your first time. Try the free 312-85 demo right now.

EC-Council 312-85 Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.
Which of the following attacks is performed on the client organization?

  • A. DHCP attacks
  • B. MAC spoofing attack
  • C. Distributed Denial-of-Service (DDoS) attack
  • D. Bandwidth attack

Answer: C

NEW QUESTION 2
Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor.

  • A. Industrial spies
  • B. State-sponsored hackers
  • C. Insider threat
  • D. Organized hackers

Answer: D

NEW QUESTION 3
Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?

  • A. Strategic threat intelligence
  • B. Tactical threat intelligence
  • C. Technical threat intelligence
  • D. Operational threat intelligence

Answer: C

NEW QUESTION 4
Sam works as an analyst in an organization named InfoTech Security. He was asked to collect information from various threat intelligence sources. In meeting the deadline, he forgot to verify the threat intelligence sources and used data from an open-source data provider, who offered it at a very low cost. Through it was beneficial at the initial stage but relying on such data providers can produce unreliable data and noise putting the organization network into risk.
What mistake Sam did that led to this situation?

  • A. Sam used unreliable intelligence sources.
  • B. Sam used data without context.
  • C. Sam did not use the proper standardization formats for representing threat data.
  • D. Sam did not use the proper technology to use or consume the information.

Answer: D

NEW QUESTION 5
Walter and Sons Company has faced major cyber attacks and lost confidential data. The company has decided to concentrate more on the security rather than other resources. Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to perform qualitative data analysis to extract useful information from collected bulk data.
Which of the following techniques will help Alice to perform qualitative data analysis?

  • A. Regression analysis, variance analysis, and so on
  • B. Numerical calculations, statistical modeling, measurement, research, and so on.
  • C. Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on
  • D. Finding links between data and discover threat-related information

Answer: C

NEW QUESTION 6
Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.
Identify the type data collection method used by the Karry.

  • A. Active data collection
  • B. Passive data collection
  • C. Exploited data collection
  • D. Raw data collection

Answer: B

NEW QUESTION 7
Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts.
During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

  • A. Dissemination and integration
  • B. Planning and direction
  • C. Processing and exploitation
  • D. Analysis and production

Answer: A

NEW QUESTION 8
Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?

  • A. Intelligence related to increased attacks targeting a particular software or operating system vulnerability
  • B. Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)
  • C. Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs
  • D. Intelligence that reveals risks related to various strategic business decisions

Answer: B

NEW QUESTION 9
Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

  • A. Repeater
  • B. Gateway
  • C. Hub
  • D. Network interface card (NIC)

Answer: B

NEW QUESTION 10
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.

  • A. Operational threat intelligence analysis
  • B. Technical threat intelligence analysis
  • C. Strategic threat intelligence analysis
  • D. Tactical threat intelligence analysis

Answer: D

NEW QUESTION 11
Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.
What stage of ACH is Bob currently in?

  • A. Diagnostics
  • B. Evidence
  • C. Inconsistency
  • D. Refinement

Answer: A

NEW QUESTION 12
Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s website from the time of its inception as well as the removed information from the target website.
What should Alison do to get the information he needs.

  • A. Alison should use SmartWhois to extract the required website information.
  • B. Alison should use https://archive.org to extract the required website information.
  • C. Alison should run the Web Data Extractor tool to extract the required website information.
  • D. Alison should recover cached pages of the website from the Google search engine cache to extract the required website information.

Answer: C

NEW QUESTION 13
An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.
Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers, graphics, and multimedia?

  • A. The right time
  • B. The right presentation
  • C. The right order
  • D. The right content

Answer: B

NEW QUESTION 14
A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

  • A. Threat modelling
  • B. Application decomposition and analysis (ADA)
  • C. Analysis of competing hypotheses (ACH)
  • D. Automated technical analysis

Answer: C

NEW QUESTION 15
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

  • A. Active online attack
  • B. Zero-day attack
  • C. Distributed network attack
  • D. Advanced persistent attack

Answer: B

NEW QUESTION 16
......

P.S. Easily pass 312-85 Exam with 49 Q&As 2passeasy Dumps & pdf Version, Welcome to Download the Newest 2passeasy 312-85 Dumps: https://www.2passeasy.com/dumps/312-85/ (49 New Questions)