exam questions

Exam 312-85 All Questions

View all questions & answers for the 312-85 exam

Exam 312-85 topic 1 question 20 discussion

Actual exam question from ECCouncil's 312-85
Question #: 20
Topic #: 1
[All 312-85 Questions]

Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?

  • A. Dissemination and integration
  • B. Planning and direction
  • C. Processing and exploitation
  • D. Analysis and production
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
pinguin666
Highly Voted 2 years ago
Selected Answer: C
page 48: Processing and Exploitation  Process raw data for exploitation  Convert processed data into usable format for data analysis
upvoted 12 times
...
Bigbear246
Highly Voted 2 years ago
The correct answer is C - Processing and Exploitation Data processing and exploitation are key tasks of an analyst where he/she has to reduce the collected data into useful and reliable information that can be further used in threat analysis. Data processing and exploitation deal with the following tasks: • Structuring/normalization of collected data • Storing and data visualization • Sharing the threat information
upvoted 8 times
...
vikask13
Most Recent 7 months, 3 weeks ago
Answer: D - Analysis and Production (Page 48) COnverting raw data in to information with machine learning and statistical methods
upvoted 1 times
...
azera_exl
9 months, 1 week ago
Selected Answer: C
The analysts are 'converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods'. Page 48 states 'Processing and Exploitation' processes raw data and converts processed data into a usable format.
upvoted 1 times
...
upichi
10 months, 3 weeks ago
D. Analysis and production | Page 49 Keywords: machine-based techniques, and statistical methods.
upvoted 1 times
...
Kezuko
10 months, 3 weeks ago
Selected Answer: C
C, cause just started
upvoted 1 times
...
cybercypher
11 months, 1 week ago
Answer is D
upvoted 1 times
...
joaquinemege
1 year, 1 month ago
Selected Answer: C
at the phrase " the analysts started converting", "Started" is the key word, beacause they have not finished the activity yet
upvoted 2 times
...
BionicBeaver
1 year, 2 months ago
Selected Answer: D
Answer is D As per Module 01 Page 49 Certified Threat of CTIA Courseware
upvoted 2 times
...
[Removed]
1 year, 2 months ago
Selected Answer: D
Answer is D As per Module 01 Page 49 of ECC Courseware
upvoted 3 times
...
[Removed]
1 year, 2 months ago
Selected Answer: C
Answer is C As per Module 01 Page 48 of ECC Courseware
upvoted 2 times
...
Night_Hawk
1 year, 3 months ago
Selected Answer: D
Answer is D, ref page 48
upvoted 3 times
...
Anzk
1 year, 3 months ago
answer is D page 48
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago