Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-85 All Questions

View all questions & answers for the 312-85 exam

Exam 312-85 topic 1 question 83 discussion

Actual exam question from ECCouncil's 312-85
Question #: 83
Topic #: 1
[All 312-85 Questions]

Marie, a threat analyst at an organization named TechSavvy, was asked to perform operational threat intelligence analysis to get contextual information about security events and incidents.
Which of the following sources does Marie need to use to perform operational threat intelligence analysis?

  • A. Attack group reports, attack campaign reports, incident reports, malware samples
  • B. Activity-related attacks, social media sources, chat room conversations
  • C. OSINT, security industry white papers, human contacts
  • D. Malware indicators, network indicators, e-mail indicators
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Esste
5 days, 18 hours ago
Selected Answer: B
Page 27 - Operational threat intelligence is generally collected from sources such as humans, social media and chat rooms, and also from real-world activities and events that result in cyberattacks.
upvoted 1 times
...
7119c34
3 weeks, 5 days ago
The answer is B not A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...