Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 274 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 274
Topic #: 1
[All 312-50v12 Questions]

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.

Which type of threat intelligence is used by Roma to secure the internal network?

  • A. Operational threat intelligence
  • B. Strategic threat intelligence
  • C. Tactical threat intelligence
  • D. Technical threat intelligence
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shaody
3 months ago
Selected Answer: D
Technical threat intelligence is directly fed into the security devices in digital format to block and identify inbound and outbound malicious traffic entering the organization’s network.
upvoted 1 times
...
kinaJ
3 months, 4 weeks ago
Selected Answer: D
Explanation: Operational threat intelligence: Provides information about specific threats against the organization. It is typically more focused on specific incidents and real-time situations. Strategic threat intelligence: Provides a broader, long-term view of threats and trends. It is often used by senior management to inform policy and strategy. Tactical threat intelligence: Focuses on the tactics, techniques, and procedures (TTPs) used by threat actors. It is generally used for understanding and mitigating specific threats. Technical threat intelligence: Involves technical details about threats, such as indicators of compromise (IOCs) like IP addresses, domain names, file hashes, and malware signatures. This type of intelligence is used to configure security devices to detect and block malicious activities.
upvoted 2 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: D
CEHv12 - 66
upvoted 1 times
...
qwerty100
8 months, 4 weeks ago
Selected Answer: D
D. Technical threat intelligence
upvoted 1 times
...
insaniunt
9 months ago
Selected Answer: D
Roma is using Technical threat intelligence to feed information into security devices to identify and block inbound and outbound malicious traffic. Technical threat intelligence typically provides detailed technical information about threats, such as indicators of compromise (IoCs) and specific details about the tactics, techniques, and procedures (TTPs) used by malicious actors.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...