Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Threat Intelligence Analyst (CTIA) Question and Answers

Certified Threat Intelligence Analyst (CTIA)

Last Update Nov 30, 2025
Total Questions : 87

We are offering FREE 312-85 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-85 free exam questions and then go for complete pool of Certified Threat Intelligence Analyst (CTIA) test questions that will help you more.

312-85 pdf

312-85 PDF

$36.75  $104.99
312-85 Engine

312-85 Testing Engine

$43.75  $124.99
312-85 PDF + Engine

312-85 PDF + Testing Engine

$57.75  $164.99
Questions 1

An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.

Which of the following sources will help the analyst to collect the required intelligence?

Options:

A.  

Active campaigns, attacks on other organizations, data feeds from external third parties

B.  

OSINT, CTI vendors, ISAO/ISACs

C.  

Campaign reports, malware, incident reports, attack group reports, human intelligence

D.  

Human, social media, chat rooms

Discussion 0
Questions 2

Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?

Options:

A.  

Risk tolerance

B.  

Timeliness

C.  

Attack origination points

D.  

Multiphased

Discussion 0
Questions 3

Tech Knights Inc., a small-scale company, has decided to share the intelligence information with various organizations using a nonprofit association that provides a secure place to accumulate and share the information about cyber threats in the industry, and it also provides an extended service of data analysis to the organizational network.

Which of the following types of sharing organizations should Tech Knights Inc. use to share information?

Options:

A.  

Trading partners

B.  

Information Sharing and Analysis Centers (ISACs)

C.  

Informal contacts

D.  

Commercial vendors

Discussion 0
Questions 4

Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling methodology where she performed the following stages:

Stage 1: Build asset-based threat profiles

Stage 2: Identify infrastructure vulnerabilities

Stage 3: Develop security strategy and plans

Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?

Options:

A.  

TRIKE

B.  

VAST

C.  

OCTAVE

D.  

DREAD

Discussion 0
Questions 5

Steve is working as an analyst for Highlanders & Co. While performing data analysis, he used a method in which he included a list of all activities required to complete the project, time, dependencies, and logical endpoints such as milestones to acquire information about the relationship between various activities and the period of the activities obtained.

Which of the following data analysis methods was used by Steve?

Options:

A.  

Critical path analysis

B.  

Timeline analysis

C.  

Cone of plausibility

D.  

Analogy analysis

Discussion 0
Questions 6

James, a senior threat intelligence officer, was tasked with assessing the success and failure of the threat intelligence program established by the organization. As part of the assessment, James reviewed the outcome of the intelligence program, determined if any improvements were required, and identified the past learnings that can be applied to future programs.

Identify the activity performed by James in the above scenario.

Options:

A.  

Report findings and recommendations

B.  

Determine the fulfillment of stakeholders

C.  

Conduct a gap analysis

D.  

Determine the costs and benefits associated with the program

Discussion 0
Questions 7

Philip, a professional hacker, is planning to attack an organization. In order to collect information, he covertly collects information from the target person by maintaining a personal or other relationship with the target person.

Which of the following intelligence sources is used by Philip to collect information about the target organization?

Options:

A.  

CHIS

B.  

MASINT

C.  

SOCMINT

D.  

FISINT

Discussion 0
Questions 8

Jack is a professional hacker who wants to perform remote exploitation on the target system of an organization. He established a two-way communication channel between the victim's system and his server. He used encryption techniques to hide the presence of a communication channel on a victim's system and further applied privilege escalation techniques to exploit the system.

What phase of the cyber kill chain methodology is Jack currently in?

Options:

A.  

Command and Control

B.  

Weaponization

C.  

Reconnaissance

D.  

Delivery

Discussion 0
Questions 9

You are a cybersecurity analyst working at a financial institution. An unusual pattern of financial transactions was detected, suggesting potential fraud or money laundering. What specific type of threat intelligence would you rely on to analyze these financial activities and identify potential risks?

Options:

A.  

OSINT

B.  

CHIS

C.  

TECHINT

D.  

FININT

Discussion 0
Questions 10

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Options:

A.  

DNS zone transfer

B.  

Dynamic DNS

C.  

DNS interrogation

D.  

Fast-Flux DNS

Discussion 0
Questions 11

ABC is a well-established cyber-security company in the United States. The organization implemented the automation of tasks such as data enrichment and indicator aggregation. They also joined various communities to increase their knowledge about the emerging threats. However, the security teams can only detect and prevent identified threats in a reactive approach.

Based on threat intelligence maturity model, identify the level of ABC to know the stage at which the organization stands with its security and vulnerabilities.

Options:

A.  

Level 2: increasing CTI capabilities

B.  

Level 3: CTI program in place

C.  

Level 1: preparing for CTI

D.  

Level 0: vague where to start

Discussion 0
Questions 12

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.

Daniel comes under which of the following types of threat actor.

Options:

A.  

Industrial spies

B.  

State-sponsored hackers

C.  

Insider threat

D.  

Organized hackers

Discussion 0
Questions 13

Mario is working as an analyst in an XYZ organization in the United States. He has been asked to prepare a threat landscape report to provide in-depth awareness and greater insight into the threats his organization is facing.

Which of the following details should he include to prepare a threat landscape report?

Options:

A.  

A summary of threat actors most likely targeting the organization along with their motivations, intentions, and TTPs

B.  

Attribution of an attack to specific threat actor or group

C.  

Attacker's motivation and intention behind the attack

D.  

History of an attack and location where it was performed

Discussion 0
Questions 14

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

Options:

A.  

1-->9-->2-->8-->3-->7-->4-->6-->5

B.  

3-->4-->5-->2-->1-->9-->8-->7-->6

C.  

1-->2-->3-->4-->5-->6-->9-->8-->7

D.  

1-->2-->3-->4-->5-->6-->7-->8-->9

Discussion 0
Questions 15

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

Options:

A.  

Red

B.  

White

C.  

Green

D.  

Amber

Discussion 0
Questions 16

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.  

Initial intrusion

B.  

Search and exfiltration

C.  

Expansion

D.  

Persistence

Discussion 0
Questions 17

An autonomous robot was deployed to navigate and learn about the environment. Through a trial-and-error process, the robot refines its actions based on positive or negative feedback to maximize cumulative rewards.

What type of machine learning will the robot employ in this scenario?

Options:

A.  

Unsupervised learning

B.  

Semi-supervised learning

C.  

Reinforcement learning

D.  

Supervised learning

Discussion 0
Questions 18

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Options:

A.  

Threat modelling

B.  

Application decomposition and analysis (ADA)

C.  

Analysis of competing hypotheses (ACH)

D.  

Automated technical analysis

Discussion 0
Questions 19

Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by comparing the project results with the original objectives by reviewing project charter. He is also reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable level of quality.

Identify the activity that Joe is performing to assess a TI program’s success or failure.

Options:

A.  

Determining the fulfillment of stakeholders

B.  

Identifying areas of further improvement

C.  

Determining the costs and benefits associated with the program

D.  

Conducting a gap analysis

Discussion 0
Questions 20

What term describes the trust establishment process, wherein the first organization relies on a body of evidence presented to the second organization, and the level of trust is contingent upon the degree and quality of evidence provided by the initiating organization?

Options:

A.  

Mandated trust

B.  

Direct historical trust

C.  

Validated trust

D.  

Mediated trust

Discussion 0
Questions 21

Flora, a threat intelligence analyst at PanTech Cyber Solutions, is working on a threat intelligence program. She is trying to collect the company's crucial information through online job sites.

Which of the following information will Flora obtain through job sites?

Options:

A.  

Hardware and software information, network-related information, and technologies used by the company

B.  

Top-level domains and subdomains of the company

C.  

Open ports and services

Discussion 0
Questions 22

Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements.

Which of the following considerations must be employed by Henry to prioritize intelligence requirements?

Options:

A.  

Understand frequency and impact of a threat

B.  

Understand data reliability

C.  

Develop a collection plan

D.  

Produce actionable data

Discussion 0
Questions 23

Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.

What stage of the cyber-threat intelligence is Michael currently in?

Options:

A.  

Unknown unknowns

B.  

Unknowns unknown

C.  

Known unknowns

D.  

Known knowns

Discussion 0
Questions 24

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?

Options:

A.  

Sandboxing

B.  

Normalization

C.  

Data visualization

D.  

Convenience sampling

Discussion 0
Questions 25

Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.

In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

Options:

A.  

Dissemination and integration

B.  

Planning and direction

C.  

Processing and exploitation

D.  

Analysis and production

Discussion 0
Questions 26

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

Options:

A.  

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

B.  

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

C.  

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

D.  

Intelligence that reveals risks related to various strategic business decisions

Discussion 0