New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Page: 1 / 6

CTIA Certified Threat Intelligence Analyst (CTIA)

Certified Threat Intelligence Analyst (CTIA)

Last Update Dec 14, 2025
Total Questions : 87

To help you prepare for the 312-85 ECCouncil exam, we are offering free 312-85 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-85 practice questions. Once you have done that, you will have access to the entire pool of Certified Threat Intelligence Analyst (CTIA) 312-85 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Certified Threat Intelligence Analyst (CTIA) resources online to help you better understand the topics covered on the exam, such as Certified Threat Intelligence Analyst (CTIA) 312-85 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-85 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 2

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.  

Data collection through passive DNS monitoring

B.  

Data collection through DNS interrogation

C.  

Data collection through DNS zone transfer

D.  

Data collection through dynamic DNS (DDNS)

Discussion 0
Questions 3

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

Options:

A.  

Nation-state attribution

B.  

True attribution

C.  

Campaign attribution

D.  

Intrusion-set attribution

Discussion 0
Questions 4

Flora, a threat intelligence analyst at PanTech Cyber Solutions, is working on a threat intelligence program. She is trying to collect the company's crucial information through online job sites.

Which of the following information will Flora obtain through job sites?

Options:

A.  

Hardware and software information, network-related information, and technologies used by the company

B.  

Top-level domains and subdomains of the company

C.  

Open ports and services

Discussion 0
Ace
No problem! I highly recommend Cramkey Dumps to anyone looking to pass their certification exams. They will help you feel confident and prepared on exam day. Good luck!
Harris Nov 3, 2025
That sounds amazing. I'll definitely check them out. Thanks for the recommendation!
Ari
Can anyone explain what are these exam dumps and how are they?
Ocean Nov 21, 2025
They're exam preparation materials that are designed to help you prepare for various certification exams. They provide you with up-to-date and accurate information to help you pass your exams.
Melody
My experience with Cramkey was great! I was surprised to see that many of the questions in my exam appeared in the Cramkey dumps.
Colby Nov 20, 2025
Yes, In fact, I got a score of above 85%. And I attribute a lot of my success to Cramkey's dumps.
Walter
Yayyy!!! I passed my exam with the help of Cramkey Dumps. Highly appreciated!!!!
Angus Nov 20, 2025
YES….. I saw the same questions in the exam.
River
Hey, I used Cramkey Dumps to prepare for my recent exam and I passed it.
Lewis Nov 9, 2025
Yeah, I used these dumps too. And I have to say, I was really impressed with the results.
Questions 5

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.  

Initial intrusion

B.  

Search and exfiltration

C.  

Expansion

D.  

Persistence

Discussion 0

312-85
PDF

$36.75  $104.99

312-85 Testing Engine

$43.75  $124.99

312-85 PDF + Testing Engine

$57.75  $164.99