Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

312-85 Sample Questions Answers

Questions 4

Jack is a professional hacker who wants to perform remote exploitation on the target system of an organization. He established a two-way communication channel between the victim's system and his server. He used encryption techniques to hide the presence of a communication channel on a victim's system and further applied privilege escalation techniques to exploit the system.

What phase of the cyber kill chain methodology is Jack currently in?

Options:

A.

Command and Control

B.

Weaponization

C.

Reconnaissance

D.

Delivery

Buy Now
Questions 5

Sam works as an analyst in an organization named InfoTech Security. He was asked to collect information from various threat intelligence sources. In meeting the deadline, he forgot to verify the threat intelligence sources and used data from an open-source data provider, who offered it at a very low cost. Through it was beneficial at the initial stage but relying on such data providers can produce unreliable data and noise putting the organization network into risk.

What mistake Sam did that led to this situation?

Options:

A.

Sam used unreliable intelligence sources.

B.

Sam used data without context.

C.

Sam did not use the proper standardization formats for representing threat data.

D.

Sam did not use the proper technology to use or consume the information.

Buy Now
Questions 6

Two cybersecurity teams from different organizations joined forces to combat a rapidly evolving malware campaign targeting their industry. They exchange real-time information about the attackers’ techniques, compromised systems, and immediate defensive actions. What type of threat intelligence sharing characterizes this collaboration?

Options:

A.

Sharing tactical threat intelligence

B.

Sharing operational threat intelligence

C.

Sharing strategic threat intelligence

D.

Sharing technical threat intelligence

Buy Now
Questions 7

Tech Knights Inc., a small-scale company, has decided to share the intelligence information with various organizations using a nonprofit association that provides a secure place to accumulate and share the information about cyber threats in the industry, and it also provides an extended service of data analysis to the organizational network.

Which of the following types of sharing organizations should Tech Knights Inc. use to share information?

Options:

A.

Trading partners

B.

Information Sharing and Analysis Centers (ISACs)

C.

Informal contacts

D.

Commercial vendors

Buy Now
Questions 8

Philip, a professional hacker, is planning to attack an organization. In order to collect information, he covertly collects information from the target person by maintaining a personal or other relationship with the target person.

Which of the following intelligence sources is used by Philip to collect information about the target organization?

Options:

A.

CHIS

B.

MASINT

C.

SOCMINT

D.

FISINT

Buy Now
Questions 9

Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring, he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.

Which of the following key indicators of compromise does this scenario present?

Options:

A.

Unusual outbound network traffic

B.

Unexpected patching of systems

C.

Unusual activity through privileged user account

D.

Geographical anomalies

Buy Now
Questions 10

Jacob, a professional hacker, created an exact replica of an online shopping website. He copied the entire contents of the original website onto the local system that enables him to create a dummy spam website for performing social engineering attacks over the employees.

What type of technique did Jacob use for cloning the website?

Options:

A.

Data sampling

B.

Website mirroring

C.

Tailgating

D.

Social engineering

Buy Now
Questions 11

An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.

Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers,

graphics, and multimedia?

Options:

A.

The right time

B.

The right presentation

C.

The right order

D.

The right content

Buy Now
Questions 12

Organizations must choose the right threat intelligence platform to assess and leverage intelligence information, monitor multiple enforcement points, manage intelligence feeds, and select appropriate security for digital assets.

Which of the following key factors ensures that the threat intelligence platform offers a structured way to perform investigations on attacks by processing the threat intelligence and utilizing internal security controls to automate the detection process?

Options:

A.

Scoring

B.

Search

C.

Workflow

D.

Open

Buy Now
Questions 13

Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.

In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

Options:

A.

Dissemination and integration

B.

Planning and direction

C.

Processing and exploitation

D.

Analysis and production

Buy Now
Questions 14

In which of the following forms of bulk data collection are large amounts of data first collected from multiple sources in multiple formats and then processed to achieve threat intelligence?

Options:

A.

Structured form

B.

Hybrid form

C.

Production form

D.

Unstructured form

Buy Now
Questions 15

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?

Options:

A.

Sandboxing

B.

Normalization

C.

Data visualization

D.

Convenience sampling

Buy Now
Questions 16

Bob is a threat intelligence analyst in Global Technologies Inc. While extracting threat intelligence, he identified that the organization is vulnerable to various application threats that can be exploited by attackers.

Which of the following are the possible application threats that have been identified by Bob?

Options:

A.

SQL injection and buffer overflow attack

B.

Man-in-the-middle attack and physical security attack

C.

DNS and ARP poisoning

D.

Footprinting and spoofing

Buy Now
Questions 17

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Options:

A.

Threat modelling

B.

Application decomposition and analysis (ADA)

C.

Analysis of competing hypotheses (ACH)

D.

Automated technical analysis

Buy Now
Questions 18

A threat analyst working in XYZ Company was asked to perform threat intelligence analysis. During the information collection phase, he used a social engineering technique where he pretended to be a legitimate or authorized person. Using this technique, he gathered sensitive information by scanning terminals for passwords, searching important documents on desks, rummaging bins, and so on.

Which of the following social engineering techniques was used by the analyst for information collection?

Options:

A.

Impersonation

B.

Shoulder surfing

C.

Piggybacking

D.

Dumpster diving

Buy Now
Questions 19

An autonomous robot was deployed to navigate and learn about the environment. Through a trial-and-error process, the robot refines its actions based on positive or negative feedback to maximize cumulative rewards.

What type of machine learning will the robot employ in this scenario?

Options:

A.

Unsupervised learning

B.

Semi-supervised learning

C.

Reinforcement learning

D.

Supervised learning

Buy Now
Questions 20

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Options:

A.

Active online attack

B.

Zero-day attack

C.

Distributed network attack

D.

Advanced persistent attack

Buy Now
Questions 21

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

Which of the following online sources should Alice use to gather such information?

Options:

A.

Financial services

B.

Social network settings

C.

Hacking forums

D.

Job sites

Buy Now
Questions 22

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Options:

A.

Search

B.

Open

C.

Workflow

D.

Scoring

Buy Now
Questions 23

Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.

What stage of ACH is Bob currently in?

Options:

A.

Diagnostics

B.

Evidence

C.

Inconsistency

D.

Refinement

Buy Now
Questions 24

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.

Data collection through passive DNS monitoring

B.

Data collection through DNS interrogation

C.

Data collection through DNS zone transfer

D.

Data collection through dynamic DNS (DDNS)

Buy Now
Questions 25

What term describes the trust establishment process, wherein the first organization relies on a body of evidence presented to the second organization, and the level of trust is contingent upon the degree and quality of evidence provided by the initiating organization?

Options:

A.

Mandated trust

B.

Direct historical trust

C.

Validated trust

D.

Mediated trust

Buy Now
Questions 26

Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

Options:

A.

Risk tolerance

B.

Timeliness

C.

Attack origination points

D.

Multiphased

Buy Now
Exam Code: 312-85
Exam Name: Certified Threat Intelligence Analyst (CTIA)
Last Update: Nov 29, 2025
Questions: 87
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 312-85