Actual EC-Council 312-85 Free Practice Exam Online

It is more faster and easier to pass the EC-Council 312-85 exam by using Virtual EC-Council Certified Threat Intelligence Analyst questuins and answers. Immediate access to the Latest 312-85 Exam and find the same core area 312-85 questions with professionally verified answers, then PASS your exam with a high score now.

Also have 312-85 free dumps questions for you:

NEW QUESTION 1
Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

  • A. Nation-state attribution
  • B. True attribution
  • C. Campaign attribution
  • D. Intrusion-set attribution

Answer: B

NEW QUESTION 2
Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.
Which of the following online sources should Alice use to gather such information?

  • A. Financial services
  • B. Social network settings
  • C. Hacking forums
  • D. Job sites

Answer: C

NEW QUESTION 3
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

  • A. Active online attack
  • B. Zero-day attack
  • C. Distributed network attack
  • D. Advanced persistent attack

Answer: B

NEW QUESTION 4
Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.
Which of the following types of trust model is used by Garry to establish the trust?

  • A. Mediated trust
  • B. Mandated trust
  • C. Direct historical trust
  • D. Validated trust

Answer: D

NEW QUESTION 5
An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.
Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers, graphics, and multimedia?

  • A. The right time
  • B. The right presentation
  • C. The right order
  • D. The right content

Answer: B

NEW QUESTION 6
What is the correct sequence of steps involved in scheduling a threat intelligence program?
* 1. Review the project charter
* 2. Identify all deliverables
* 3. Identify the sequence of activities
* 4. Identify task dependencies
* 5. Develop the final schedule
* 6. Estimate duration of each activity
* 7. Identify and estimate resources for all activities
* 8. Define all activities
* 9. Build a work breakdown structure (WBS)

  • A. 1-->9-->2-->8-->3-->7-->4-->6-->5
  • B. 3-->4-->5-->2-->1-->9-->8-->7-->6
  • C. 1-->2-->3-->4-->5-->6-->9-->8-->7
  • D. 1-->2-->3-->4-->5-->6-->7-->8-->9

Answer: A

NEW QUESTION 7
An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?

  • A. DNS zone transfer
  • B. Dynamic DNS
  • C. DNS interrogation
  • D. Fast-Flux DNS

Answer: D

NEW QUESTION 8
Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

  • A. Repeater
  • B. Gateway
  • C. Hub
  • D. Network interface card (NIC)

Answer: B

NEW QUESTION 9
In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.
Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

  • A. Game theory
  • B. Machine learning
  • C. Decision theory
  • D. Cognitive psychology

Answer: C

NEW QUESTION 10
Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor.

  • A. Industrial spies
  • B. State-sponsored hackers
  • C. Insider threat
  • D. Organized hackers

Answer: D

NEW QUESTION 11
A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.
Which of the following attacks is performed on the client organization?

  • A. DHCP attacks
  • B. MAC spoofing attack
  • C. Distributed Denial-of-Service (DDoS) attack
  • D. Bandwidth attack

Answer: C

NEW QUESTION 12
Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

  • A. related: www.infothech.org
  • B. info: www.infothech.org
  • C. link: www.infothech.org
  • D. cache: www.infothech.org

Answer: A

NEW QUESTION 13
An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.
What stage of the threat modeling is Mr. Andrews currently in?

  • A. System modeling
  • B. Threat determination and identification
  • C. Threat profiling and attribution
  • D. Threat ranking

Answer: C

NEW QUESTION 14
Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements.
Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

  • A. Understand frequency and impact of a threat
  • B. Understand data reliability
  • C. Develop a collection plan
  • D. Produce actionable data

Answer: A

NEW QUESTION 15
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?

  • A. Internal intelligence feeds
  • B. External intelligence feeds
  • C. CSV data feeds
  • D. Proactive surveillance feeds

Answer: A

NEW QUESTION 16
......

P.S. Downloadfreepdf.net now are offering 100% pass ensure 312-85 dumps! All 312-85 exam questions have been updated with correct answers: https://www.downloadfreepdf.net/312-85-pdf-download.html (49 New Questions)