Free 312-85 Practice Test Questions 2026

87 Questions


Last Updated On : 27-Apr-2026


SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?


A. Search


B. Open


C. Workflow


D. Scoring





D.
  Scoring

Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.

What should Jim do to detect the data staging before the hackers exfiltrate from the network?


A. Jim should identify the attack at an initial stage by checking the content of the user agent field.


B. Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.


C. Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.


D. Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.





C.
  Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.

An organization, namely Highlander, Inc., decided to integrate threat intelligence into the incident response process for rapid detection and recovery from various security incidents.

In which of the following phases of the incident response management does the organization utilize operational and tactical threat intelligence to provide context to the alerts generated by various security mechanisms?


A. Phase 1: Preplanning


B. Phase 2: Event


C. Phase 3: Incident


D. Phase 4: Breach





C.
  Phase 3: Incident

While monitoring network activities, an unusual surge in outbound traffic was noticed, and a potential security incident was suspected. In the context of incident responses, what is the initial stage at which you actively recognize and confirm the presence of an incident?


A. Identification


B. Recovery


C. Containment


D. Eradication





A.
  Identification

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

Which of the following online sources should Alice use to gather such information?


A. Financial services


B. Social network settings


C. Hacking forums


D. Job sites





C.
  Hacking forums

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but after performing proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?


A. Advisories


B. Strategic reports


C. Detection indicators


D. Low-level data





D.
  Low-level data

Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the data collection phase, he used a data collection method that involves no participants and is purely based on analysis and observation of activities and processes going on within the local boundaries of the organization.

Identify the type of data collection method used by Karry.


A. Exploited data collection


B. Active data collection


C. Raw data collection


D. Passive data collection





D.
  Passive data collection

Jacob, a professional hacker, created an exact replica of an online shopping website. He copied the entire contents of the original website onto the local system that enables him to create a dummy spam website for performing social engineering attacks over the employees.

What type of technique did Jacob use for cloning the website?


A. Data sampling


B. Website mirroring


C. Tailgating


D. Social engineering





B.
  Website mirroring

Philip, a professional hacker, is planning to attack an organization. In order to collect information, he covertly collects information from the target person by maintaining a personal or other relationship with the target person.

Which of the following intelligence sources is used by Philip to collect information about the target organization?


A. CHIS


B. MASINT


C. SOCMINT


D. FISINT





A.
  CHIS

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.

Identify the type of threat intelligence analysis is performed by John.


A. Operational threat intelligence analysis


B. Technical threat intelligence analysis


C. Strategic threat intelligence analysis


D. Tactical threat intelligence analysis





D.
  Tactical threat intelligence analysis

While analyzing a series of security incidents, you notice a pattern of attacks originating from specific geographical locations. To gain deeper insight into the spatial aspects of these threats, what contextualization method would you employ to understand the geographic origin and distribution of the attacks?


A. Policy context


B. Historical context


C. Temporal context


D. Spatial context





D.
  Spatial context

In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.

Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?


A. Game theory


B. Machine learning


C. Decision theory


D. Cognitive psychology





A.
  Game theory


Page 2 out of 8 Pages
Next
123
312-85 Practice Test Home

What Makes Our Certified Threat Intelligence Analyst Practice Test So Effective?

Real-World Scenario Mastery: Our 312-85 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Certified Threat Intelligence Analyst exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 312-85 practice exam questions pool covering all topics, the real exam feels like just another practice session.