exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 311 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 311
Topic #: 1
[All 312-50v11 Questions]

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task,
Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.
Which type of threat intelligence is used by Roma to secure the internal network?

  • A. Operational threat intelligence
  • B. Strategic threat intelligence
  • C. Tactical threat intelligence
  • D. Technical threat intelligence
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
victorfs
5 months, 2 weeks ago
Selected Answer: D
The correct option is D. Technical threat intelligence
upvoted 2 times
...
Daniel8660
1 year ago
Selected Answer: D
Cyber Threat Intelligence Types of Threat Intelligence - Technical Threat Intelligence Technical threat intelligence provides information about resources an attacker uses to perform an attack; this includes command and control channels, tools, and other items. It has a shorter lifespan compared to tactical threat intelligence and mainly focuses on a specific IoC. It provides rapid distribution and response to threats.This intelligence is directly fed into the security devices in digital format to block and identify inbound and outbound malicious traffic entering the organization’s network. (P.76/60)
upvoted 3 times
...
mileke2
1 year, 5 months ago
Selected Answer: D
Answer is technical
upvoted 2 times
...
[Removed]
1 year, 6 months ago
Selected Answer: D
According to CEHv11 Book 1 pg. 76 "This information helps security professionals add the identified indicators to the defensive systems such as IDS and IPS, firewalls, and endpoint security systems, thereby enhancing the detection mechanisms used to identify the attacks at an early stage. It also helps them identify malicious traffic and IP addresses suspected of spreading malware and spam emails. This intelligence is directly fed into the security devices in digital format to block and identify inbound and outbound malicious traffic entering the organization’s network."
upvoted 3 times
...
stettin12
1 year, 7 months ago
Selected Answer: D
In my opinion the "security devices" is a key.
upvoted 1 times
...
Jong1
1 year, 7 months ago
Selected Answer: D
Definition Word for word in CEH Book p.60
upvoted 1 times
...
gokhansah1n
1 year, 7 months ago
Selected Answer: A
Operational Cyber Threat Intelligence Operational intelligence is mostly comprised of machine-readable data, also known as indicators of compromise (IOCs). It can be URLs, file names and hashes, domain names, IP addresses, etc. Its use ranges from blocking attacks to triaging and validating alerts and searching and eliminating specific threats within a network. IOCs usually become outdated in a matter of hours. Still, it is important to note that aging indicators aren’t good practice as threats may remain active for months or even years, continuing to pose danger to enterprises. As the most volatile of the three types of intelligence, Operational indicators should be closely vetted and monitored to assure their dependability. They are better consumed by tools like SPAM filters, firewalls, IDS/IPS, SIEM, SOAR, etc, helping security teams quickly respond to malicious campaigns. Operational threat intelligence indicators are collected from active campaigns, attacks performed against honeypots and data shared by third parties. https://www.malwarepatrol.net/three-types-of-cyber-threat-intelligence/
upvoted 2 times
la144
1 year, 7 months ago
No. D (Technical Intelligence) is correct. From CEHv11 book page 76: Last sentence from the Second paragraph: This intelligence is directly fed into the security devices in digital format to block and identify inbound and outbound malicious traffic entering the organization’s network.
upvoted 2 times
...
...
Silascarter
1 year, 11 months ago
Technical Intelligence is Correct. It also helps Incident Response teams identify malicious traffic and suspected IP addresses used to spread malware and spam mails. This intelligence is directly fed into the security devices in digital format to block and identify inbound and outbound malicious traffic entering the organization’s network.
upvoted 2 times
...
AmadSyahir
1 year, 11 months ago
Technical threat intelligence provides information above an attacker’s resources that are used to perform the attack; this includes command and control channels, tools, etc mainly focuses on a specific loC. It provides rapid distribution and response to threats.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago