Free 312-85 Exam Braindumps (page: 8)

Page 7 of 23

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.

  1. Operational threat intelligence analysis
  2. Technical threat intelligence analysis
  3. Strategic threat intelligence analysis
  4. Tactical threat intelligence analysis

Answer(s): D



SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

  1. Search
  2. Open
  3. Workflow
  4. Scoring

Answer(s): D



Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a stage where he is required to apply his analysis skills effectively to reject as many hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the bottom.
What stage of ACH is Bob currently in?

  1. Diagnostics
  2. Evidence
  3. Inconsistency
  4. Refinement

Answer(s): A



Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.
Connection status and content type
Accept-ranges and last-modified information
X-powered-by information -
Web server in use and its version
Which of the following tools should the Tyrion use to view header content?

  1. Hydra
  2. AutoShun
  3. Vanguard enforcer
  4. Burp suite

Answer(s): D






Post your Comments and Discuss EC-Council 312-85 exam with other Community members:

Exam Discussions & Posts