Skip to content

Certified Threat Intelligence Analyst

Here you have the best ECCouncil 312-85 practice exam questions

  • Preview the first 5 of 88 questions for free
  • These questions were last updated on May 17, 2026
  • This site is not affiliated with or endorsed by ECCouncil.
Question 1 of 88

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.

Daniel comes under which of the following types of threat actor.

Answer

Suggested Answer

The suggested answer is D.

Daniel is motivated by profit and conducts hacking activities to steal sensitive data and money, which he then sells on the black market. This fits the description of organized hackers, who often work in groups, are highly skilled, and engage in illegal activities for financial gain.

Community Votes4 votes
DSuggested
100%
Question 2 of 88

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Answer

Suggested Answer

The suggested answer is D.

Fast-Flux DNS is a technique used by attackers where a single domain name is associated with multiple IP addresses that change rapidly. This method helps attackers to hide phishing and malware delivery locations in a network of compromised bots, making it difficult to trace and shut down the malicious servers.

Community Votes3 votes
DSuggested
100%
Question 3 of 88

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).

Which TLP color would you signify that information should be shared only within a particular community?

Answer

Suggested Answer

The suggested answer is C.

The Traffic Light Protocol (TLP) is a set of designations used to ensure that sensitive information is shared with the appropriate audience. The TLP color 'Green' signifies that information can be shared within a defined community. This means that the information can be shared freely within a particular community but not beyond it. Therefore, the correct TLP color for ensuring that sensitive information is shared only within a particular community is 'Green'.

Community Votes9 votes
CSuggested
56%
D
44%
Question 4 of 88

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.Which of the following Google search queries should Moses use?

Answer

Suggested Answer

The suggested answer is A.

To identify whether any fake websites are hosted that are similar to the organization’s URL, the correct Google search query to use is 'related: www.infothech.org'. The 'related' operator is used to find websites related to a specified URL, which can help in identifying potential phishing or fake websites that mimic the organization’s URL.

Community Votes2 votes
ASuggested
100%
Question 5 of 88

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Answer

Suggested Answer

The suggested answer is C.

The correct process to identify the most consistent theory out of multiple theories proposed by analysts is the Analysis of Competing Hypotheses (ACH). ACH is a structured analytic technique that involves comparing multiple hypotheses against available evidence to determine which hypothesis is most consistent with the evidence. This method helps in systematically evaluating each hypothesis, thereby identifying the most accurate conclusion.

Community Votes2 votes
CSuggested
100%

83 more questions await

Unlock the full ECCouncil 312-85 question bank

5 of 88 completed6%

Choose your plan

One-time payment · No subscription · No hidden fees

Standard

Quick preparation

$25

30 days access

30 day access to all questions
Instant free updates
Highest passing rate in industry
Printable PDF download
No money-back guarantee
Best Value

Premium

Guaranteed success

$60$35

90 days access

PDF

Printable PDF download

New

Save every question as a PDF for offline study or printing.

90 day access to all questions
Instant free updates
Highest passing rate in industry
Pass guaranteed or money back

100% Money-Back Guarantee

Don't pass? Full refund.

4.9/5

Based on 5,108+ reviews

Trusted by thousands of professionals

Join certified professionals who passed their exams with Examice

Examice helped me pass my AWS certification on the first try! The questions were incredibly similar to the real exam. Comments helped me understand answers I was struggling with.
S
Sarah C.
Cloud Engineer
Great results in a short prep time. Passed on my first attempt.
D
David K.
Network Engineer
I needed to pass an exam for work, and this website delivered. The quality for the price is outstanding, and the support is really good. I passed without issues.
M
Michael R.
Security Analyst
Skeptical at first, but impressed. Every question included clear, detailed explanations.
L
Lisa M.
Solutions Architect
The guarantee gave me confidence to invest in the premium package. Turns out I didn't need it. Passed comfortably. The explanations for each answer were incredibly detailed and helped me grasp security concepts that I'd been struggling with for months.
R
Robert H.
Cybersecurity Consultant
Used Examice for my PMP certification. The questions were well structured and covered all exam domains thoroughly.
J
James T.
IT Manager
After failing my first attempt with other study materials, I switched to Examice and passed confidently on my second attempt.
A
Anna W.
Data Engineer
The premium package was worth it. 90 days of access gave me the flexibility to study when it worked for me, without feeling rushed.
E
Emily J.
DevOps Engineer
Straightforward questions that matched the real exam perfectly. Studied for two weeks and passed with a great score.
K
Karen P.
Systems Administrator

Frequently Asked Questions

Everything you need to know. Contact us for more.

Our ECCouncil 312-85 questions are based on real exam experiences and are continuously updated to match the current exam format. We maintain a +99% pass rate because our questions closely mirror what you'll see on the actual exam.

With our Premium package, you get a 100% money-back guarantee. If you don't pass your exam after studying with our materials, simply contact us with your exam results and we'll refund your purchase. Terms and conditions apply, read our full refund policy to learn more.

Our question bank is updated regularly based on feedback from recent exam takers. We typically review and update our content every week with reports about new questions or changes to the exam format.

Standard package access cannot be extended. However, Premium package gives you 90 days which is typically more than enough time to prepare thoroughly. If you need additional time, you can purchase a new package at any time.

This is a one-time payment with no recurring charges. Once you purchase, you get full access to all exam questions for the duration of your package (30 days for Standard, 90 days for Premium). No hidden fees or automatic renewals.

Pass on your first try

All 88questions · Detailed explanations · Printable PDF · 90 days access

Money-back guaranteeSecure checkout
$35

one-time payment