Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-85 All Questions

View all questions & answers for the 312-85 exam

Exam 312-85 topic 1 question 78 discussion

Actual exam question from ECCouncil's 312-85
Question #: 78
Topic #: 1
[All 312-85 Questions]

You are the leading cybersecurity analyst at financial institutions. An anomaly is detected in the network, suggesting a potential security threat. To proactively investigate and mitigate the risk, arrange the following steps in the correct sequence as part of the threat hunting process:

1) Investigation
2) Collect and process data
3) Response
4) Hypothesis
5) Trigger

a) 5 –> 3 –> 1 –> 4 –> 2
b) 3 –> 2 –> 5 –> 1 –> 4
c) 4 –> 1 –> 3 –> 5 –> 2
d) 4 –> 2 –> 5 –> 1 –> 3

  • A. c
  • B. d
  • C. a
  • D. b
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
RAMI_PAL
4 days, 4 hours ago
Answer is d
upvoted 1 times
...
c29a12d
1 week, 3 days ago
Selected Answer: B
According to CTIA course slides is: Hypothesis, Collection & Process, Trigger, Investigation and Response. Correct answer: B. d
upvoted 1 times
...
c29a12d
1 week, 3 days ago
According to CTIA course slides is: Hypothesis, Collection & Process, Trigger, Investigation and Response. Correct answer: B. d
upvoted 1 times
...
7119c34
2 weeks, 5 days ago
the asnwer is B.d
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...