Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 312-85 Practice Exam with Questions & Answers | Set: 2

Questions 11

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Options:
A.

Active online attack

B.

Zero-day attack

C.

Distributed network attack

D.

Advanced persistent attack

ECCouncil 312-85 Premium Access
Questions 12

A consortium was established in a collaborative effort to strengthen the cybersecurity posture of multiple organizations within an industry sector. The participating entities decided to adopt a threat intelligence exchange architecture in which all threat data is collected, analyzed, and disseminated through a single central hub.

What type of threat intelligence exchange architecture was implemented in this scenario?

Options:
A.

Decentralized exchange architecture

B.

Federated exchange architecture

C.

Hybrid exchange architecture

D.

Centralized exchange architecture

Questions 13

A threat analyst working in XYZ Company was asked to perform threat intelligence analysis. During the information collection phase, he used a social engineering technique where he pretended to be a legitimate or authorized person. Using this technique, he gathered sensitive information by scanning terminals for passwords, searching important documents on desks, rummaging bins, and so on.

Which of the following social engineering techniques was used by the analyst for information collection?

Options:
A.

Impersonation

B.

Shoulder surfing

C.

Piggybacking

D.

Dumpster diving

Questions 14

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Options:
A.

DNS zone transfer

B.

Dynamic DNS

C.

DNS interrogation

D.

Fast-Flux DNS

Questions 15

Which component of risk management involves evaluating and ranking risks based on their significance, allowing organizations to focus resources on addressing the most critical threats?

Options:
A.

Risk identification

B.

Risk prioritization

C.

Risk assessment

D.

Risk mitigation

Questions 16

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

Which of the following online sources should Alice use to gather such information?

Options:
A.

Financial services

B.

Social network settings

C.

Hacking forums

D.

Job sites

Questions 17

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

Options:
A.

Red

B.

White

C.

Green

D.

Amber

Questions 18

Michael, a threat analyst at an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he started analyzing the information and understanding the nature of the threats.

What stage of cyber-threat intelligence is Michael currently in?

Options:
A.

Unknown unknowns

B.

Known unknowns

C.

Unknown knowns

D.

Known knowns

Questions 19

You are a Security Operations Center (SOC) analyst responsible for monitoring and safeguarding the organization’s network. During routine activities, you identify a potential vulnerability that can expose critical systems to exploitation. In what specific aspect of cybersecurity would you actively engage in when addressing and mitigating this vulnerability?

Options:
A.

Threat intelligence analysis

B.

Vulnerability management

C.

Security awareness training

D.

Incident response

Questions 20

As the CEO of a multinational corporation, you focus on making decisions that align with the organization's long-term goals and overall business strategies. What type of threat intelligence would be most valuable in guiding your decisions to enhance a company's resilience against emerging cyber threats?

Options:
A.

Operational threat intelligence

B.

Tactical threat intelligence

C.

Strategic threat intelligence

D.

Technical threat intelligence