Free 312-85 Exam Braindumps

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor.

  1. Industrial spies
  2. State-sponsored hackers
  3. Insider threat
  4. Organized hackers

Answer(s): D



Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.

What stage of ACH is Bob currently in?

  1. Diagnostics
  2. Evidence
  3. Inconsistency
  4. Refinement

Answer(s): A



Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.

Connection status and content type
Accept-ranges and last-modified information
X-powered-by information
Web server in use and its version

Which of the following tools should the Tyrion use to view header content?

  1. Hydra
  2. AutoShun
  3. Vanguard enforcer
  4. Burp suite

Answer(s): D



Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by comparing the project results with the original objectives by reviewing project charter. He is also reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable level of quality.

Identify the activity that Joe is performing to assess a TI program’s success or failure.

  1. Determining the fulfillment of stakeholders
  2. Identifying areas of further improvement
  3. Determining the costs and benefits associated with the program
  4. Conducting a gap analysis

Answer(s): D



An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.

Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers, graphics, and multimedia?

  1. The right time
  2. The right presentation
  3. The right order
  4. The right content

Answer(s): B