ExamGecko
Home / ECCouncil / 312-85 / List of questions
Ask Question

ECCouncil 312-85 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Become a Premium Member for full access
  Unlock Premium Member

Question 42

Report Export Collapse

H&P, Inc. is a small-scale organization that has decided to outsource the network security monitoring due to lack of resources in the organization. They are looking for the options where they can directly incorporate threat intelligence into their existing network defense solutions.

Which of the following is the most cost-effective methods the organization can employ?

Become a Premium Member for full access
  Unlock Premium Member

Question 43

Report Export Collapse

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Become a Premium Member for full access
  Unlock Premium Member

Question 44

Report Export Collapse

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

Become a Premium Member for full access
  Unlock Premium Member

Question 45

Report Export Collapse

Tim is working as an analyst in an ABC organization. His organization had been facing many challenges in converting the raw threat intelligence data into meaningful contextual information. After inspection, he found that it was due to noise obtained from misrepresentation of data from huge data collections. Hence, it is important to clean the data before performing data analysis using techniques such as data reduction. He needs to choose an appropriate threat intelligence framework that automatically performs data collection, filtering, and analysis for his organization.

Which of the following threat intelligence frameworks should he choose to perform such task?

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.

What stage of the threat modeling is Mr. Andrews currently in?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

Alison, an analyst in an XYZ organization, wants to retrieve information about a company's website from the time of its inception as well as the removed information from the target website.

What should Alison do to get the information he needs.

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

In which of the following forms of bulk data collection are large amounts of data first collected from multiple sources in multiple formats and then processed to achieve threat intelligence?

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Become a Premium Member for full access
  Unlock Premium Member
Total 50 questions
Go to page: of 5
Search

Related questions