exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 274 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 274
Topic #: 1
[All 312-50v13 Questions]

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.
Which type of threat intelligence is used by Roma to secure the internal network?

  • A. Operational threat intelligence
  • B. Strategic threat intelligence
  • C. Tactical threat intelligence
  • D. Technical threat intelligence
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NikoTomas
5 days, 20 hours ago
Selected Answer: D
EC-Council’s CEH and ECSA (Certified Security Analyst) training materials recognizes four primary threat intelligence categories or levels: 🧠 1. Strategic Threat Intelligence • High-level, long-term insights • Used by executives and senior leadership • Focuses on trends, adversary motives, and risk management • Answers questions like: “Who might target us and why?” ✅ Example: Reports on geopolitical cyber threats, industry-specific attack trends 🛠️ 2. Tactical Threat Intelligence • Focuses on adversary tactics, techniques, and procedures (TTPs) • Consumed by security teams, threat hunters, and SOC analysts • Helps in understanding how attacks are carried out ✅ Example: Use of phishing + PowerShell + lateral movement with specific tools 🎯 Often aligned with MITRE ATT&CK framework Continuation below...
upvoted 1 times
NikoTomas
5 days, 20 hours ago
...continuation: 🔬 3. Technical Threat Intelligence • Short-lived, machine-readable data • Includes: o IP addresses o URLs o File hashes o Domain names • Useful for SIEMs, firewalls, EDRs, and threat detection systems ✅ Example: A SHA256 hash of a malware file or a malicious domain to block 📦 4. Operational Threat Intelligence • Provides details on ongoing attacks, campaigns, and adversary infrastructure • May include attack timelines, C2 server behavior, or campaign tracking • Useful for incident response teams ✅ Example: Intelligence about a specific APT group's phishing infrastructure used in current campaign
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago