Free 312-85 Exam Dumps

No Installation Required, Instantly Prepare for the 312-85 exam and please click the below link to start the 312-85 Exam Simulator with a real 312-85 practice exam questions.
Use directly our on-line 312-85 exam dumps materials and try our Testing Engine to pass the 312-85 which is always updated.

  • Exam Code: 312-85
  • Exam Title: Certified Threat Intelligence Analyst
  • Vendor: EC-Council
  • Exam Questions: 49
  • Last Updated: July 3rd,2024

Question 1

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Correct Answer:B

Question 2

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

Correct Answer:A

Question 3

Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?

Correct Answer:C

Question 4

An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.
Which of the following sources of intelligence did the analyst use to collect information?

Correct Answer:C

Question 5

Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by comparing the project results with the original objectives by reviewing project charter. He is also reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable level of quality.
Identify the activity that Joe is performing to assess a TI program’s success or failure.

Correct Answer:D