100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
EC-Council CTIA EXAM WITH CORRECT ANSWERS 2024 $13.99   Add to cart

Exam (elaborations)

EC-Council CTIA EXAM WITH CORRECT ANSWERS 2024

 7 views  0 purchase
  • Course
  • EC-Council CTIA
  • Institution
  • EC-Council CTIA

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential d...

[Show more]

Preview 2 out of 14  pages

  • August 19, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • EC-Council CTIA
  • EC-Council CTIA
avatar-seller
HopeJewels
EC-Council CTIA
Daniel is a professional hacker whose aim is to attack a system to steal data and money
for profit. He performs hacking to obtain confidential data such as social security
numbers, personally
identifiable information (PII) of an employee, and credit card information. After obtaining
confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor?


A. Industrial spies
B. State-sponsored hackers
C. Insider threat
D. Organized hackers correct answers D. Organized Hackers

An attacker instructs bots to use camouflage mechanism to hide his phishing and
malware delivery locations in the rapidly changing network of compromised bots. In this
particular technique, a single domain name consists of multiple IP addresses. Which of
the following technique is used by the attacker?

A. DNS zone transfer
B. Dynamic DNS
C. DNS interrogation
D. Fast-Flux DNS correct answers D. Fast-Flux DNS

Kathy wants to ensure that she shares threat intelligence containing sensitive
information with the appropriate audience. Hence, she used traffic light protocol (TLP).
Which TLP color would you signify that information should be shared only within a
particular
community?

A. Red
B. White
C. Green
D. Amber correct answers D. Amber

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information
about the potential threats the organization is facing by using advanced Google search
operators. He wants
to identify whether any fake websites are hosted at the similar to the organization's
URL. Which of the following Google search queries should Moses use?

A. related: www.infotec.org
B. info: www.infotec.org

, C. link: www.infotec.org
D. cache: www.infotec.org correct answers A. related:www.infotec.org

A team of threat intelligence analysts is performing threat analysis on malware, and
each of them has come up with their own theory and evidence to support their theory on
a given malware. Now, to identify the most consistent theory out of all the theories,
which of the following analytic processes must threat intelligence manager use?

A. Threat modelling
B. Application decomposition and analysis (ADA)
C. Analysis of competing hypotheses (ACH)
D. Automated technical analysis correct answers C. Analysis of Competing Hypotheses
(ACH)

Miley, an analyst, wants to reduce the amount of collected data and make the storing
and sharing process easy. She uses filtering, tagging, and queuing technique to sort out
the relevant and structured data from the large amounts of unstructured data.
Which of the following techniques was employed by Miley?

A. Sandboxing
B. Normalization
C. Data visualization
D. Convenience sampling correct answers B. Normalization

Bob, a threat analyst, works in an organization named TechTop. He was asked to
collect intelligence to fulfill the needs and requirements of the Red Team present within
the organization. Which of the following are the needs of a Red Team?

A. Intelligence related to increased attacks targeting a particular software or operating
system vulnerability
B. Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and
procedures (TTPs)
C. Intelligence extracted latest attacks analysis on similar organizations, which includes
details about latest threats and TTPs
D. Intelligence that reveals risks related to various strategic business decisions correct
answers B. Intelligence on latest vulnerabilities, threat actors, and their tactics,
techniques, and procedures
(TTPs)

Michael, a threat analyst, works in an organization named TechTop, was asked to
conduct a cyber-threat intelligence analysis. After obtaining information regarding
threats, he has started analyzing the information and understanding the nature of the
threats. What stage of the cyber-threat intelligence is Michael currently in?

A. Unknown unknowns
B. Unknowns unknown

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller HopeJewels. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77529 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart