| Exam Name: | Certified Threat Intelligence Analyst (CTIA) | ||
| Exam Code: | 312-85 Dumps | ||
| Vendor: | ECCouncil | Certification: | CTIA |
| Questions: | 87 Q&A's | Shared By: | hadi |
Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?
Flora, a threat intelligence analyst at PanTech Cyber Solutions, is working on a threat intelligence program. She is trying to collect the company's crucial information through online job sites.
Which of the following information will Flora obtain through job sites?
Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?
John, a threat intelligence analyst in CyberTech Company, was asked to obtain information that provides greater insight into the current cyber risks. To gather such information, John needs to find the answers to the following questions:
Why the organization might be attacked?
How the organization might be attacked?
Who might be the intruders?Identify the type of security testing John is going to perform.