Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil CTIA 312-85 Questions and answers with Dumpstech

Exam 312-85 Premium Access

View all detail and faqs for the 312-85 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Kira works as a security analyst in an organization. She was asked to define and set up the requirements before collecting threat intelligence information. The requirements should focus on what must be collected in order to fulfil production intelligence.

Which of the following categories of threat intelligence requirements should Kira focus on?

Options:

A.

Production requirements

B.

Intelligence requirements

C.

Business requirements

D.

Collection requirements

Questions # 22:

Tech Crunch Inc. has hired John, who is a professional threat intelligence analyst. He was asked to conduct threat intelligence analysis that provides contextual information about the security events and incidents that further help the organization to disclose potential risks, provide greater insight into attacker methodologies, identify past malicious activities, and perform investigations on malicious activities in a more efficient way.

Identify the type of threat intelligence John is going to perform for the organization.

Options:

A.

Operational threat intelligence

B.

Strategic threat intelligence

C.

Technical threat intelligence

D.

Tactical threat intelligence

Questions # 23:

An autonomous robot was deployed to navigate and learn about the environment. Through a trial-and-error process, the robot refines its actions based on positive or negative feedback to maximize cumulative rewards.

What type of machine learning will the robot employ in this scenario?

Options:

A.

Unsupervised learning

B.

Semi-supervised learning

C.

Reinforcement learning

D.

Supervised learning

Questions # 24:

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Options:

A.

Distributed storage

B.

Object-based storage

C.

Centralized storage

D.

Cloud storage

Questions # 25:

Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.

Which of the following categories of threat intelligence feed was acquired by Jian?

Options:

A.

Internal intelligence feeds

B.

External intelligence feeds

C.

CSV data feeds

D.

Proactive surveillance feeds

Questions # 26:

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.

Which of the following Google search queries should Moses use?

Options:

A.

related: www.infothech.org

B.

info: www.infothech.org

C.

link: www.infothech.org

D.

cache: www.infothech.org

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions