Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-85 Topic 3 Question 25 Discussion

Actual exam question for Eccouncil's 312-85 exam
Question #: 25
Topic #: 3
[All 312-85 Questions]

An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.

Which of the following sources will help the analyst to collect the required intelligence?

Show Suggested Answer Hide Answer
Suggested Answer: B

For gathering strategic threat intelligence that provides a high-level overview of the current cybersecurity posture, potential financial impacts of cyber activities, and overarching threats, sources such as Open Source Intelligence (OSINT), Cyber Threat Intelligence (CTI) vendors, and Information Sharing and Analysis Organizations (ISAOs)/Information Sharing and Analysis Centers (ISACs) are invaluable. OSINT involves collecting data from publicly available sources, CTI vendors specialize in providing detailed threat intelligence services, and ISAOs/ISACs facilitate the sharing of threat data within specific industries or communities. These sources can provide broad insights into threat landscapes, helping organizations understand how to align their cybersecurity strategies with current trends and threats. Reference:

'Cyber Threat Intelligence: Sources and Methods,' by Max Kilger, Ph.D., SANS Institute Reading Room

'Open Source Intelligence (OSINT): An Introduction to the Basic Concepts and the Potential Benefits for Information Security,' by Kevin Cardwell, IEEE Xplore


Contribute your Thoughts:

Ethan
18 days ago
Option A sounds like a great way to stay up-to-date on the latest attacks. After all, who needs sleep when you have data feeds?
upvoted 0 times
Howard
4 days ago
C) Campaign reports, malware, incident reports, attack group reports, human intelligence
upvoted 0 times
...
Buddy
6 days ago
A) Active campaigns, attacks on other organizations, data feeds from external third parties
upvoted 0 times
...
...
Elza
23 days ago
Social media, huh? I bet the threat analysts will find a lot of 'helpful' information in chat rooms. Option D it is!
upvoted 0 times
Twanna
3 days ago
Yeah, chat rooms can be a breeding ground for cyber threats.
upvoted 0 times
...
Erasmo
5 days ago
I think social media can be a goldmine for threat intelligence.
upvoted 0 times
...
...
Ilda
1 months ago
I think option C) Campaign reports, malware, incident reports, attack group reports, human intelligence could also be useful in gathering the necessary information.
upvoted 0 times
...
Whitney
1 months ago
I'm torn between B and C, but I think C covers all the bases. Can't go wrong with that one.
upvoted 0 times
Kerry
9 days ago
Yeah, campaign reports, malware, incident reports, attack group reports, and human intelligence seem like crucial sources.
upvoted 0 times
...
Madalyn
16 days ago
I think C covers all the bases. Can't go wrong with that one.
upvoted 0 times
...
...
Alesia
1 months ago
Option C seems the most comprehensive to me. Incident reports and intelligence on attack groups would be crucial.
upvoted 0 times
...
Ernest
1 months ago
I agree with Corinne. Option A seems like the best choice for collecting the required intelligence.
upvoted 0 times
...
Beckie
1 months ago
Definitely option B. OSINT and CTI vendors are the way to go for comprehensive threat intelligence.
upvoted 0 times
Lorrine
24 days ago
Yes, those sources are essential for gathering threat intelligence.
upvoted 0 times
...
Nada
1 months ago
I agree, OSINT and CTI vendors provide valuable information.
upvoted 0 times
...
...
Corinne
2 months ago
I think option A) Active campaigns, attacks on other organizations, data feeds from external third parties would be helpful.
upvoted 0 times
...

Save Cancel