New Year Special 75% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 75brite

Page: 1 / 6

CTIA Certified Threat Intelligence Analyst (CTIA)

Certified Threat Intelligence Analyst (CTIA)

Last Update Jan 17, 2026
Total Questions : 87

To help you prepare for the 312-85 ECCouncil exam, we are offering free 312-85 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-85 practice questions. Once you have done that, you will have access to the entire pool of Certified Threat Intelligence Analyst (CTIA) 312-85 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Certified Threat Intelligence Analyst (CTIA) resources online to help you better understand the topics covered on the exam, such as Certified Threat Intelligence Analyst (CTIA) 312-85 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-85 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 2

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.  

Data collection through passive DNS monitoring

B.  

Data collection through DNS interrogation

C.  

Data collection through DNS zone transfer

D.  

Data collection through dynamic DNS (DDNS)

Discussion 0
Questions 3

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

Options:

A.  

Nation-state attribution

B.  

True attribution

C.  

Campaign attribution

D.  

Intrusion-set attribution

Discussion 0
Questions 4

Flora, a threat intelligence analyst at PanTech Cyber Solutions, is working on a threat intelligence program. She is trying to collect the company's crucial information through online job sites.

Which of the following information will Flora obtain through job sites?

Options:

A.  

Hardware and software information, network-related information, and technologies used by the company

B.  

Top-level domains and subdomains of the company

C.  

Open ports and services

Discussion 0
Ari
Can anyone explain what are these exam dumps and how are they?
Ocean Dec 20, 2025
They're exam preparation materials that are designed to help you prepare for various certification exams. They provide you with up-to-date and accurate information to help you pass your exams.
Miley
Hey, I tried Cramkey Dumps for my IT certification exam. They are really awesome and helped me pass my exam with wonderful score.
Megan Dec 16, 2025
That’s great!!! I’ll definitely give it a try. Thanks!!!
Mylo
Excellent dumps with authentic information… I passed my exam with brilliant score.
Dominik Dec 26, 2025
That's amazing! I've been looking for good study material that will help me prepare for my upcoming certification exam. Now, I will try it.
Elise
I've heard that Cramkey is one of the best websites for exam dumps. They have a high passing rate and the questions are always up-to-date. Is it true?
Cian Dec 27, 2025
Definitely. The dumps are constantly updated to reflect the latest changes in the certification exams. And I also appreciate how they provide explanations for the answers, so I could understand the reasoning behind each question.
Questions 5

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.  

Initial intrusion

B.  

Search and exfiltration

C.  

Expansion

D.  

Persistence

Discussion 0

312-85
PDF

$26.25  $104.99

312-85 Testing Engine

$31.25  $124.99

312-85 PDF + Testing Engine

$41.25  $164.99