312-85 Dumps

312-85 Free Practice Test

EC-Council 312-85: Certified Threat Intelligence Analyst

QUESTION 6

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

Correct Answer: A

QUESTION 7

Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.
Which of the following sharing platforms should be used by Kim?

Correct Answer: D

QUESTION 8

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Correct Answer: B

QUESTION 9

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).
Which TLP color would you signify that information should be shared only within a particular community?

Correct Answer: D

QUESTION 10

Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.
What stage of the cyber-threat intelligence is Michael currently in?

Correct Answer: C