Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-85 Topic 7 Question 27 Discussion

Actual exam question for Eccouncil's 312-85 exam
Question #: 27
Topic #: 7
[All 312-85 Questions]

Sarah is a security operations center (SOC) analyst working at JW Williams and Sons organization based in Chicago. As a part of security operations, she contacts information providers (sharing partners) for gathering information such as collections of validated and prioritized threat indicators along with a detailed technical analysis of malware samples, botnets, DDoS attack methods, and various other malicious tools. She further used the collected information at the tactical and operational levels.

Sarah obtained the required information from which of the following types of sharing partner?

Show Suggested Answer Hide Answer
Suggested Answer: C

The information Sarah is gathering, which includes collections of validated and prioritized threat indicators along with detailed technical analysis of malware samples, botnets, DDoS methods, and other malicious tools, indicates that she is obtaining this intelligence from providers of comprehensive cyber-threat intelligence. These providers offer a holistic view of the threat landscape, combining tactical and operational threat data with in-depth analysis and context, enabling security teams to make informed decisions and strategically enhance their defenses. Reference:

'Cyber Threat Intelligence Providers: How to Choose the Right One for Your Organization,' by CrowdStrike

'The Role of Comprehensive Cyber Threat Intelligence in Effective Cybersecurity Strategies,' by FireEye


Contribute your Thoughts:

Frank
3 days ago
Haha, I bet Sarah wishes she could just ask the threat actors directly for information. That would be a bold strategy, but probably not the most effective approach.
upvoted 0 times
...
Kristofer
8 days ago
I agree with Katy, comprehensive cyber-threat intelligence providers could be the source of information.
upvoted 0 times
...
Katy
11 days ago
I believe it could also be providers of comprehensive cyber-threat intelligence.
upvoted 0 times
...
Stephania
14 days ago
This seems straightforward. I don't know why anyone would even consider options A, B, or D. It's clearly C all the way!
upvoted 0 times
...
Bronwyn
15 days ago
I agree with Aron. Sarah needs access to a broad range of threat intelligence to effectively support the security operations of the organization.
upvoted 0 times
Tony
14 hours ago
A) Providers of threat data feeds
upvoted 0 times
...
...
Laine
17 days ago
I think Sarah obtained the required information from providers of threat data feeds.
upvoted 0 times
...
Aron
24 days ago
The correct answer is C) Providers of comprehensive cyber-threat intelligence. This includes information on threat indicators, malware samples, botnets, and other malicious tools.
upvoted 0 times
Ariel
9 days ago
C) Providers of comprehensive cyber-threat intelligence
upvoted 0 times
...
Juan
11 days ago
B) Providers of threat indicators
upvoted 0 times
...
Ilona
18 days ago
A) Providers of threat data feeds
upvoted 0 times
...
...

Save Cancel