Free 312-85 Exam Braindumps (page: 5)

Page 5 of 13

Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling methodology where she performed the following stages:

Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans

Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?

  1. TRIKE
  2. VAST
  3. OCTAVE
  4. DREAD

Answer(s): C



Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

  1. Nation-state attribution
  2. True attribution
  3. Campaign attribution
  4. Intrusion-set attribution

Answer(s): B



In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.

Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

  1. Game theory
  2. Machine learning
  3. Decision theory
  4. Cognitive psychology

Answer(s): C



Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.

In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

  1. Dissemination and integration
  2. Planning and direction
  3. Processing and exploitation
  4. Analysis and production

Answer(s): A



Page 5 of 13



Post your Comments and Discuss EC-Council 312-85 exam with other Community members:

Kamekar commented on May 25, 2024
Passed this exam on May 19. This exam dumps is good and valid.
UNITED KINGDOM
upvote