exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 15 discussion

Actual exam question from ECCouncil's 212-82
Question #: 15
Topic #: 1
[All 212-82 Questions]

An organization hired a network operations center (NOC) team to protect its IT infrastructure from external attacks. The organization utilized a type of threat intelligence to protect its resources from evolving threats. The threat intelligence helped the NOC team understand how attackers are expected to perform an attack on the organization, identify the information leakage, and determine the attack goals as well as attack vectors.
Identify the type of threat intelligence consumed by the organization in the above scenario.

  • A. Operational threat intelligence
  • B. Strategic threat intelligence
  • C. Technical threat intelligence
  • D. Tactical threat intelligence
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bkob
Highly Voted 1 year, 9 months ago
It is Tactical Threat Intelligence
upvoted 8 times
...
044f354
Most Recent 1 month, 3 weeks ago
Selected Answer: D
Certified Cybersecurity Technician Courseware Module 08 Page 1029 Tactical Threat Intelligence Tactical threat intelligence plays a major role in protecting the resources of the organization. It provides information related to TTPs used by threat actors (attackers) to perform attacks. Tactical threat intelligence is consumed by cyber security professionals such as IT service managers, security operations managers, network operations center (NOC) staff, administrators, and architects. It helps the cyber security professionals understand how the adversaries are expected to perform the attack on the organization, identify the information leakage from the organization, and the technical capabilities and goals of the attackers along with the attack vectors.
upvoted 1 times
...
kikkie
7 months, 2 weeks ago
Tactical threat intelligence-Module 8 CCT -page 1029
upvoted 1 times
...
a613c45
10 months, 2 weeks ago
Technical threat intelligence focuses on particular indicators or proof of an attack and serves as a foundation for analyzing such incidents. An analyst from Threat Intelligence looks for indicators of compromise (IOCs) and command and control channels, tools, etc., including reported IP addresses, phishing email content, malware samples, and bogus URLs. Because IOCs like rogue IPs or fraudulent URLs become outdated in a matter of days, communicating technical intelligence at the right time is crucial.
upvoted 2 times
...
KnifeRing
12 months ago
Tactical is the answer: It helps the cyber security professionals understand how the adversaries are expected to perform the attack on the organization, identify the information leakage from the organization, and the technical capabilities and goals of the attackers along with the attack vectors. Using tactical threat intelligence security personnel develop detection and mitigation strategies beforehand by updating security products with identified indicators, patching vulnerable systems,
upvoted 3 times
...
pepcyber
1 year, 1 month ago
This is Tactical
upvoted 1 times
...
AmesCB
1 year, 1 month ago
Definitely Tactical Threat intelligence
upvoted 2 times
...
duke_of_kamulu
1 year, 1 month ago
tactical intelligence
upvoted 2 times
...
kanchantanwani
1 year, 3 months ago
Tactical Threat Intelligence: Tactical threat intelligence plays a major role in protecting the resources of the organization. It provides information related to TTPs used by threat actors (attackers) to perform attacks. Tactical threat intelligence is consumed by cyber security professionals such as IT service managers, security operations managers, network operations center (NOC) staff, administrators, and architects. It helps the cyber security professionals understand how the adversaries are expected to perform the attack on the organization, identify the information leakage from the organization, and the technical capabilities and goals of the attackers along with the attack vectors. Using tactical threat intelligence security personnel develop detection and mitigation strategies beforehand by updating security products with identified indicators, patching vulnerable systems, etc. The collection sources for tactical threat intelligence include campaign reports, malware, incident reports, attack group reports, human intelligence, etc.
upvoted 4 times
...
bivixa2510
1 year, 4 months ago
Selected Answer: D
Tactical (Low Level) Information on attacker's tactics, techniques, and procedures (TIPS) Consumed by IT Service and Managers, Administrators
upvoted 4 times
...
LPD
1 year, 9 months ago
Selected Answer: A
This is operational threat.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago