CREST Practitioner Threat Intelligence Analyst (CPTIA) Certification Sample Questions

Practitioner Threat Intelligence Analyst Dumps, CPTIA Dumps, CPTIA PDF, Practitioner Threat Intelligence Analyst VCE, CREST CPTIA VCE, CREST Practitioner Threat Intelligence Analyst PDFThe purpose of this Sample Question Set is to provide you with information about the CREST Practitioner Threat Intelligence Analyst exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the CPTIA certification test. To get familiar with real exam environment, we suggest you try our Sample CREST Practitioner Threat Intelligence Analyst Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual CREST Practitioner Threat Intelligence Analyst (CPTIA) certification exam.

These sample questions are simple and basic questions that represent likeness to the real CREST CPTIA exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium CREST Practitioner Threat Intelligence Analyst Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

CREST CPTIA Sample Questions:

01. Who is primarily responsible for approving the Terms of Reference in a threat intelligence engagement?
a) External threat actor profiling team
b) IT help desk manager
c) Project sponsor or client-side stakeholder
d) SOC analyst
 
02. What are two ways to mitigate the impact of known intelligence gaps?
(Choose two)
a) Apply confidence levels to findings
b) Remove all related indicators
c) Ignore and defer analysis
d) Annotate reports with assumptions
 
03. Which of the following regulations enforces data privacy and processing rules in the UK and EU?
a) Data Minimization Directive
b) Network and Information Systems Regulations
c) General Data Protection Regulation (GDPR)
d) UK Freedom of Press Act
 
04. In the Cyber Kill Chain, what phase typically follows initial delivery?
a) Reconnaissance
b) Exploitation
c) Actions on Objectives
d) Installation
 
05. Which of these is designed as a machine readable format for storing cyber threat intelligence?
a) CSV
b) ElasticSearch
c) APT
d) UBER
e) STIX
 
06. What is the primary purpose of a Terms of Reference (ToR) document in a threat intelligence engagement?
a) To list the organizational policies and procedures
b) To define scope, objectives, and responsibilities of the engagement
c) To summarize the technical controls in place
d) To outline budget constraints only
 
07. Why should OPSEC be maintained during online collection from adversary-controlled forums?
a) To test web application firewalls
b) To maximize open engagement with threat actors
c) To prevent exposing the analyst’s identity or organization
d) To increase threat visibility through public search
 
08. Under UK law, which legislation governs the interception and collection of communications data?
a) Computer Misuse Act 1990
b) GDPR
c) Freedom of Information Act 2000
d) Investigatory Powers Act 2016
 
09. Which two actions should an analyst take to preserve OPSEC when performing intelligence collection?
(Choose two)
a) Use anonymized browsing environments (e.g., Tails, VMs)
b) Always use your real LinkedIn profile to gain trust
c) Use burner identities for registration
d) Store results on shared corporate drives
 
10. Which of the following best describes the function of TAXII in threat intelligence sharing?
a) It defines a transport protocol for exchanging STIX data
b) It transforms threat indicators into graphical reports
c) It encrypts payloads using proprietary algorithms
d) It scans internal file systems for malware

Answers:

Question: 01
Answer: c
Question: 02
Answer: a, d
Question: 03
Answer: c
Question: 04
Answer: b
Question: 05
Answer: e
Question: 06
Answer: b
Question: 07
Answer: c
Question: 08
Answer: d
Question: 09
Answer: a, c
Question: 10
Answer: a

Note: For any error in CREST Practitioner Threat Intelligence Analyst (CPTIA) (CPTIA) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 5 / 5 (1 vote)