Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

All 312-85 Test Inside ECCouncil Questions

Page: 4 / 4
Total 50 questions

Certified Threat Intelligence Analyst Questions and Answers

Question 13

Sam works as an analyst in an organization named InfoTech Security. He was asked to collect information from various threat intelligence sources. In meeting the deadline, he forgot to verify the threat intelligence sources and used data from an open-source data provider, who offered it at a very low cost. Through it was beneficial at the initial stage but relying on such data providers can produce unreliable data and noise putting the organization network into risk.

What mistake Sam did that led to this situation?

Options:

A.

Sam used unreliable intelligence sources.

B.

Sam used data without context.

C.

Sam did not use the proper standardization formats for representing threat data.

D.

Sam did not use the proper technology to use or consume the information.

Question 14

In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.

Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

Options:

A.

Game theory

B.

Machine learning

C.

Decision theory

D.

Cognitive psychology

Question 15

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Options:

A.

Search

B.

Open

C.

Workflow

D.

Scoring

Page: 4 / 4
Total 50 questions