312-85試験無料問題集「ECCouncil Certified Threat Intelligence Analyst 認定」
An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?
Which of the following technique is used by the attacker?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.
Which of the following attacks is performed on the client organization?
Which of the following attacks is performed on the client organization?
正解:D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.
What stage of the cyber-threat intelligence is Michael currently in?
What stage of the cyber-threat intelligence is Michael currently in?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization's security.
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)