New Year Special 75% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 75brite

Page: 1 / 6

CTIA Certified Threat Intelligence Analyst (CTIA)

Certified Threat Intelligence Analyst (CTIA)

Last Update Jan 7, 2026
Total Questions : 87

To help you prepare for the 312-85 ECCouncil exam, we are offering free 312-85 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-85 practice questions. Once you have done that, you will have access to the entire pool of Certified Threat Intelligence Analyst (CTIA) 312-85 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Certified Threat Intelligence Analyst (CTIA) resources online to help you better understand the topics covered on the exam, such as Certified Threat Intelligence Analyst (CTIA) 312-85 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-85 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 2

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.  

Data collection through passive DNS monitoring

B.  

Data collection through DNS interrogation

C.  

Data collection through DNS zone transfer

D.  

Data collection through dynamic DNS (DDNS)

Discussion 0
Questions 3

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

Options:

A.  

Nation-state attribution

B.  

True attribution

C.  

Campaign attribution

D.  

Intrusion-set attribution

Discussion 0
River
Hey, I used Cramkey Dumps to prepare for my recent exam and I passed it.
Lewis Dec 22, 2025
Yeah, I used these dumps too. And I have to say, I was really impressed with the results.
Yusra
I passed my exam. Cramkey Dumps provides detailed explanations for each question and answer, so you can understand the concepts better.
Alisha Dec 2, 2025
I recently used their dumps for the certification exam I took and I have to say, I was really impressed.
Neve
Will I be able to achieve success after using these dumps?
Rohan Dec 16, 2025
Absolutely. It's a great way to increase your chances of success.
Inaaya
Are these Dumps worth buying?
Fraser Dec 3, 2025
Yes, of course, they are necessary to pass the exam. They give you an insight into the types of questions that could come up and help you prepare effectively.
Ayra
How these dumps are necessary for passing the certification exam?
Damian Dec 4, 2025
They give you a competitive edge and help you prepare better.
Questions 4

Flora, a threat intelligence analyst at PanTech Cyber Solutions, is working on a threat intelligence program. She is trying to collect the company's crucial information through online job sites.

Which of the following information will Flora obtain through job sites?

Options:

A.  

Hardware and software information, network-related information, and technologies used by the company

B.  

Top-level domains and subdomains of the company

C.  

Open ports and services

Discussion 0
Questions 5

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.  

Initial intrusion

B.  

Search and exfiltration

C.  

Expansion

D.  

Persistence

Discussion 0

312-85
PDF

$26.25  $104.99

312-85 Testing Engine

$31.25  $124.99

312-85 PDF + Testing Engine

$41.25  $164.99