CREST Registered Threat Intelligence Analyst (CRTIA) Certification Sample Questions

Registered Threat Intelligence Analyst Dumps, CRTIA Dumps, CRTIA PDF, Registered Threat Intelligence Analyst VCE, CREST CRTIA VCE, CREST Registered Threat Intelligence Analyst PDFThe purpose of this Sample Question Set is to provide you with information about the CREST Registered Threat Intelligence Analyst exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the CRTIA certification test. To get familiar with real exam environment, we suggest you try our Sample CREST Registered Threat Intelligence Analyst Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual CREST Registered Threat Intelligence Analyst (CRTIA) certification exam.

These sample questions are simple and basic questions that represent likeness to the real CREST CRTIA exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium CREST Registered Threat Intelligence Analyst Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

CREST CRTIA Sample Questions:

01. In a threat intelligence context, the framework known as __________ focuses on risk management principles and guidelines.
a) ISO 27005
b) ISO 31000
c) GDPR
d) OWASP
 
02. When performing ACH (Analysis of Competing Hypotheses), what is the most critical activity?
a) Creating threat actor personas
b) Classifying indicators of compromise
c) Comparing evidence against multiple explanations
d) Listing all known vulnerabilities
 
03. Which of these is designed as a machine readable format for storing cyber threat intelligence?
a) CSV
b) STIX
c) APT
d) UBER
e) ElasticSearch
 
04. During a live threat engagement, what step should be taken if an analyst detects indicators of a breach outside the defined scope?
a) Immediately notify a regulatory body
b) Halt all operations and erase findings
c) Escalate to the engagement manager and follow defined escalation paths
d) Ignore the indicators until the review phase
 
05. To ensure confidentiality, analysts often rely on __________ channels for sensitive communication with clients.
a) shared Slack channels
b) unprotected FTP sites
c) public social media
d) out-of-band secure
 
06. How does the Intelligence Preparation of the Environment (IPE) method assist analysts?
a) It prepares forecasting based on geopolitical, technical, and organizational context
b) It enables malware reverse engineering
c) It performs IP blacklisting
d) It filters out DNS artifacts
 
07. The __________ process focuses on comparing outcomes with original requirements and identifying lessons learned for continuous improvement.
a) scoping
b) delivery
c) dissemination
d) project review
 
08. Under the Bribery Act 2010, which of the following would most likely constitute an offence?
a) Giving cash to a public official to gain access to restricted cyber data
b) Offering a client a compliance report
c) Publishing redacted threat reports
d) Forwarding malware samples to the SOC
 
09. A business seeks to understand “why threat attribution is valuable.” What is the most appropriate reason?
a) Attribution allows automatic malware deletion
b) Attribution helps link campaigns to known threat actors and predict future actions
c) Attribution improves firewall performance
d) Attribution ensures full legal prosecution
 
10. What characteristics make asymmetric encryption suitable for public key infrastructure (PKI)?
a) Key pair system supporting confidentiality and digital signatures
b) Real-time symmetric key rotation
c) Supports same-key decryption only
d) Scalability in secure key distribution

Answers:

Question: 01
Answer: b
Question: 02
Answer: c
Question: 03
Answer: b
Question: 04
Answer: c
Question: 05
Answer: d
Question: 06
Answer: a
Question: 07
Answer: d
Question: 08
Answer: a
Question: 09
Answer: b
Question: 10
Answer: a, d

Note: For any error in CREST Registered Threat Intelligence Analyst (CRTIA) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 5 / 5 (2 votes)