ExamGecko

ECCouncil 312-85 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Question 1

Report
Export
Collapse

An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence.

Which of the following criteria must an analyst consider in order to make the intelligence concise, to the point, accurate, and easily understandable and must consist of a right balance between tables, narrative, numbers, graphics, and multimedia?

A.

The right time

A.

The right time

Answers
B.

The right presentation

B.

The right presentation

Answers
C.

The right order

C.

The right order

Answers
D.

The right content

D.

The right content

Answers
Suggested answer: B

Explanation:

For intelligence to be effectively disseminated and utilized by consumers, it must be presented in a manner that is concise, accurate, easily understandable, and engaging. This involves a careful balance of narrative, numerical data, tables, graphics, and potentially multimedia elements to convey the information clearly and compellingly. The right presentation takes into account the preferences and needs of the intelligence consumers, as well as the context and urgency of the information. By focusing on how the intelligence is presented, the analyst ensures that the content is not only consumed but also actionable, facilitating informed decision-making.

asked 06/01/2025
Reneus Martini
33 questions

Question 2

Report
Export
Collapse

Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.

Identify the type of threat intelligence consumer is Tracy.

A.

Tactical users

A.

Tactical users

Answers
B.

Strategic users

B.

Strategic users

Answers
C.

Operational users

C.

Operational users

Answers
D.

Technical users

D.

Technical users

Answers
Suggested answer: B

Explanation:

Tracy, as a Chief Information Security Officer (CISO), requires intelligence that aids in understanding broader business and cybersecurity trends, making informed decisions regarding new technologies, security budgets, process improvements, and staffing. This need aligns with the role of a strategic user of threat intelligence. Strategic users leverage intelligence to guide long-term planning and decision-making, focusing on minimizing business risks and safeguarding against emerging threats to new technology and business initiatives. This type of intelligence is less about the technical specifics of individual threats and more about understanding the overall threat landscape, regulatory environment, and industry trends to inform high-level strategy and policy.

Reference:

'The Role of Strategic Intelligence in Cybersecurity,' Journal of Cybersecurity Education, Research and Practice

'Cyber Threat Intelligence and the Lessons from Law Enforcement,' by Robert M. Lee and David Bianco, SANS Institute Reading Room

asked 06/01/2025
ANDREA SIMONELLI
37 questions

Question 3

Report
Export
Collapse

An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.

Which of the following sources will help the analyst to collect the required intelligence?

A.

Active campaigns, attacks on other organizations, data feeds from external third parties

A.

Active campaigns, attacks on other organizations, data feeds from external third parties

Answers
B.

OSINT, CTI vendors, ISAO/ISACs

B.

OSINT, CTI vendors, ISAO/ISACs

Answers
C.

Campaign reports, malware, incident reports, attack group reports, human intelligence

C.

Campaign reports, malware, incident reports, attack group reports, human intelligence

Answers
D.

Human, social media, chat rooms

D.

Human, social media, chat rooms

Answers
Suggested answer: B

Explanation:

For gathering strategic threat intelligence that provides a high-level overview of the current cybersecurity posture, potential financial impacts of cyber activities, and overarching threats, sources such as Open Source Intelligence (OSINT), Cyber Threat Intelligence (CTI) vendors, and Information Sharing and Analysis Organizations (ISAOs)/Information Sharing and Analysis Centers (ISACs) are invaluable. OSINT involves collecting data from publicly available sources, CTI vendors specialize in providing detailed threat intelligence services, and ISAOs/ISACs facilitate the sharing of threat data within specific industries or communities. These sources can provide broad insights into threat landscapes, helping organizations understand how to align their cybersecurity strategies with current trends and threats.

Reference:

'Cyber Threat Intelligence: Sources and Methods,' by Max Kilger, Ph.D., SANS Institute Reading Room

'Open Source Intelligence (OSINT): An Introduction to the Basic Concepts and the Potential Benefits for Information Security,' by Kevin Cardwell, IEEE Xplore

asked 06/01/2025
Praneel Maharaj
21 questions

Question 4

Report
Export
Collapse

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?

A.

Advisories

A.

Advisories

Answers
B.

Strategic reports

B.

Strategic reports

Answers
C.

Detection indicators

C.

Detection indicators

Answers
D.

Low-level data

D.

Low-level data

Answers
Suggested answer: D

Explanation:

The network administrator collected log files generated by a traffic monitoring system, which falls under the category of low-level data. This type of data might not appear useful at first glance but can reveal significant insights about network activity and potential threats upon thorough analysis. Low-level data includes raw logs, packet captures, and other granular details that, when analyzed properly, can help detect anomalous behaviors or indicators of compromise within the network. This type of information is essential for detection and response efforts, allowing security teams to identify and mitigate threats in real-time.

Reference:

'Network Forensics: Tracking Hackers through Cyberspace,' by Sherri Davidoff and Jonathan Ham, Prentice Hall

'Real-Time Detection of Anomalous Activity in Dynamic, Heterogeneous Information Systems,' IEEE Transactions on Information Forensics and Security

asked 06/01/2025
Michael Golo
22 questions

Question 5

Report
Export
Collapse

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.

Daniel comes under which of the following types of threat actor.

A.

Industrial spies

A.

Industrial spies

Answers
B.

State-sponsored hackers

B.

State-sponsored hackers

Answers
C.

Insider threat

C.

Insider threat

Answers
D.

Organized hackers

D.

Organized hackers

Answers
Suggested answer: D

Explanation:

Daniel's activities align with those typically associated with organized hackers. Organized hackers or cybercriminals work in groups with the primary goal of financial gain through illegal activities such as stealing and selling data. These groups often target large amounts of data, including personal and financial information, which they can monetize by selling on the black market or dark web. Unlike industrial spies who focus on corporate espionage or state-sponsored hackers who are backed by nation-states for political or military objectives, organized hackers are motivated by profit. Insider threats, on the other hand, come from within the organization and might not always be motivated by financial gain. The actions described in the scenario---targeting personal and financial information for sale---best fit the modus operandi of organized cybercriminal groups.

Reference:

ENISA (European Union Agency for Cybersecurity) Threat Landscape Report

Verizon Data Breach Investigations Report

asked 06/01/2025
Anthony Zaborski
48 questions

Question 6

Report
Export
Collapse

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

A.

Threat modelling

A.

Threat modelling

Answers
B.

Application decomposition and analysis (ADA)

B.

Application decomposition and analysis (ADA)

Answers
C.

Analysis of competing hypotheses (ACH)

C.

Analysis of competing hypotheses (ACH)

Answers
D.

Automated technical analysis

D.

Automated technical analysis

Answers
Suggested answer: C

Explanation:

Analysis of Competing Hypotheses (ACH) is an analytic process designed to help an analyst or a team of analysts evaluate multiple competing hypotheses on an issue fairly and objectively. ACH assists in identifying and analyzing the evidence for and against each hypothesis, ultimately aiding in determining the most likely explanation. In the scenario where a team of threat intelligence analysts has various theories on a particular malware, ACH would be the most appropriate method to assess these competing theories systematically. ACH involves listing all possible hypotheses, collecting data and evidence, and assessing the evidence's consistency with each hypothesis. This process helps in minimizing cognitive biases and making a more informed decision on the most consistent theory.

Reference:

Richards J. Heuer Jr., 'Psychology of Intelligence Analysis,' Central Intelligence Agency

'A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis,' Central Intelligence Agency

asked 06/01/2025
Viswanadha Sastry Kattamuri
44 questions

Question 7

Report
Export
Collapse

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?

A.

Sandboxing

A.

Sandboxing

Answers
B.

Normalization

B.

Normalization

Answers
C.

Data visualization

C.

Data visualization

Answers
D.

Convenience sampling

D.

Convenience sampling

Answers
Suggested answer: B

Explanation:

Normalization in the context of data analysis refers to the process of organizing data to reduce redundancy and improve efficiency in storing and sharing. By filtering, tagging, and queuing, Miley is effectively normalizing the data---converting it from various unstructured formats into a structured, more accessible format. This makes the data easier to analyze, store, and share. Normalization is crucial in cybersecurity and threat intelligence to manage the vast amounts of data collected and ensure that only relevant data is retained and analyzed. This technique contrasts with sandboxing, which is used for isolating and analyzing suspicious code; data visualization, which involves representing data graphically; and convenience sampling, which is a method of sampling where samples are taken from a group that is conveniently accessible.

Reference:

'The Application of Data Normalization to Database Security,' International Journal of Computer Science Issues

SANS Institute Reading Room, 'Data Normalization Considerations in Cyber Threat Intelligence'

asked 06/01/2025
Navaid Ali
39 questions

Question 8

Report
Export
Collapse

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.

Which of the following are the needs of a RedTeam?

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

A.

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

Answers
B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

B.

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

Answers
C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

C.

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

Answers
D.

Intelligence that reveals risks related to various strategic business decisions

D.

Intelligence that reveals risks related to various strategic business decisions

Answers
Suggested answer: B

Explanation:

Red Teams are tasked with emulating potential adversaries to test and improve the security posture of an organization. They require intelligence on the latest vulnerabilities, threat actors, and their TTPs to simulate realistic attack scenarios and identify potential weaknesses in the organization's defenses. This information helps Red Teams in crafting their attack strategies to be as realistic and relevant as possible, thereby providing valuable insights into how actual attackers might exploit the organization's systems. This need contrasts with the requirements of other teams or roles within an organization, such as strategic decision-makers, who might be more interested in intelligence related to strategic risks or Blue Teams, which focus on defending against and responding to attacks.

Reference:

Red Team Field Manual (RTFM)

MITRE ATT&CK Framework for understanding threat actor TTPs

asked 06/01/2025
Gennaro Migliaccio
33 questions

Question 9

Report
Export
Collapse

Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.

What stage of the cyber-threat intelligence is Michael currently in?

A.

Unknown unknowns

A.

Unknown unknowns

Answers
B.

Unknowns unknown

B.

Unknowns unknown

Answers
C.

Known unknowns

C.

Known unknowns

Answers
D.

Known knowns

D.

Known knowns

Answers
Suggested answer: C

Explanation:

The 'known unknowns' stage in cyber-threat intelligence refers to the phase where an analyst has identified threats but the specific details, implications, or full nature of these threats are not yet fully understood. Michael, in this scenario, has obtained information on threats and is in the process of analyzing this information to understand the nature of the threats better. This stage involves analyzing the known data to uncover additional insights and fill in the gaps in understanding, thereby transitioning the 'unknowns' into 'knowns.' This phase is critical in threat intelligence as it helps in developing actionable intelligence by deepening the understanding of the threats faced.

Reference:

'Intelligence Analysis: A Target-Centric Approach,' by Robert M. Clark

'Structured Analytic Techniques for Intelligence Analysis,' by Richards J. Heuer Jr. and Randolph H. Pherson

asked 06/01/2025
Aldays Kausiona
43 questions

Question 10

Report
Export
Collapse

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

A.

Data collection through passive DNS monitoring

A.

Data collection through passive DNS monitoring

Answers
B.

Data collection through DNS interrogation

B.

Data collection through DNS interrogation

Answers
C.

Data collection through DNS zone transfer

C.

Data collection through DNS zone transfer

Answers
D.

Data collection through dynamic DNS (DDNS)

D.

Data collection through dynamic DNS (DDNS)

Answers
Suggested answer: A

Explanation:

Passive DNS monitoring involves collecting data about DNS queries and responses without actively querying DNS servers, thereby not altering or interfering with DNS traffic. This technique allows analysts to track changes in DNS records and observe patterns that may indicate malicious activity. In the scenario described, Enrique is employing passive DNS monitoring by using a recursive DNS server to log the responses received from name servers, storing these logs in a central database for analysis. This approach is effective for identifying malicious domains, mapping malware campaigns, and understanding threat actors' infrastructure without alerting them to the fact that they are being monitored. This method is distinct from active techniques such as DNS interrogation or zone transfers, which involve sending queries to DNS servers, and dynamic DNS, which refers to the automatic updating of DNS records.

Reference:

SANS Institute InfoSec Reading Room, 'Using Passive DNS to Enhance Cyber Threat Intelligence'

'Passive DNS Replication,' by Florian Weimer, FIRST Conference Presentation

asked 06/01/2025
Ariel Acosta
35 questions
Total 50 questions
Go to page: of 5