Free 312-85 Exam Braindumps (page: 7)

Page 6 of 23

Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?

  1. Internal intelligence feeds
  2. External intelligence feeds
  3. CSV data feeds
  4. Proactive surveillance feeds

Answer(s): D



Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

  1. Repeater
  2. Gateway
  3. Hub
  4. Network interface card (NIC)

Answer(s): B



What is the correct sequence of steps involved in scheduling a threat intelligence program?
1. Review the project charter
2. Identify all deliverables
3. Identify the sequence of activities
4. Identify task dependencies
5. Develop the final schedule
6. Estimate duration of each activity
7. Identify and estimate resources for all activities
8. Define all activities
9. Build a work breakdown structure (WBS)

  1. 1-->9-->2-->8-->3-->7-->4-->6-->5
  2. 3-->4-->5-->2-->1-->9-->8-->7-->6
  3. 1-->2-->3-->4-->5-->6-->9-->8-->7
  4. 1-->2-->3-->4-->5-->6-->7-->8-->9

Answer(s): A



Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.
Which of the following sharing platforms should be used by Kim?

  1. Cuckoo sandbox
  2. OmniPeek
  3. PortDroid network analysis
  4. Blueliv threat exchange network

Answer(s): D






Post your Comments and Discuss EC-Council 312-85 exam with other Community members:

Exam Discussions & Posts