New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Page: 1 / 6

CTIA Certified Threat Intelligence Analyst (CTIA)

Certified Threat Intelligence Analyst (CTIA)

Last Update Dec 21, 2025
Total Questions : 87

To help you prepare for the 312-85 ECCouncil exam, we are offering free 312-85 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-85 practice questions. Once you have done that, you will have access to the entire pool of Certified Threat Intelligence Analyst (CTIA) 312-85 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Certified Threat Intelligence Analyst (CTIA) resources online to help you better understand the topics covered on the exam, such as Certified Threat Intelligence Analyst (CTIA) 312-85 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-85 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 2

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.  

Data collection through passive DNS monitoring

B.  

Data collection through DNS interrogation

C.  

Data collection through DNS zone transfer

D.  

Data collection through dynamic DNS (DDNS)

Discussion 0
Nell
Are these dumps reliable?
Ernie Nov 23, 2025
Yes, very much so. Cramkey Dumps are created by experienced and certified professionals who have gone through the exams themselves. They understand the importance of providing accurate and relevant information to help you succeed.
Teddie
yes, I passed my exam with wonderful score, Accurate and valid dumps.
Isla-Rose Nov 2, 2025
Absolutely! The questions in the dumps were almost identical to the ones that appeared in the actual exam. I was able to answer almost all of them correctly.
Andrew
Are these dumps helpful?
Jeremiah Nov 9, 2025
Yes, Don’t worry!!! I'm confident you'll find them to be just as helpful as I did. Good luck with your exam!
Georgina
I used Cramkey Dumps to prepare for my recent exam and I have to say, they were a huge help.
Corey Nov 26, 2025
Really? How did they help you? I know these are the same questions appears in exam. I will give my try. But tell me if they also help in some training?
Questions 3

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

Options:

A.  

Nation-state attribution

B.  

True attribution

C.  

Campaign attribution

D.  

Intrusion-set attribution

Discussion 0
Questions 4

Flora, a threat intelligence analyst at PanTech Cyber Solutions, is working on a threat intelligence program. She is trying to collect the company's crucial information through online job sites.

Which of the following information will Flora obtain through job sites?

Options:

A.  

Hardware and software information, network-related information, and technologies used by the company

B.  

Top-level domains and subdomains of the company

C.  

Open ports and services

Discussion 0
Questions 5

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.  

Initial intrusion

B.  

Search and exfiltration

C.  

Expansion

D.  

Persistence

Discussion 0

312-85
PDF

$36.75  $104.99

312-85 Testing Engine

$43.75  $124.99

312-85 PDF + Testing Engine

$57.75  $164.99