EC-Council CTIA Module 1.1 Practice Test 001

This practice test covers Module 1 (Introduction to Threat Intelligence) Sub-module 1 (Intelligence).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 1.1 Practice Test 001
10 questions • Single best answer
Question 1
A CTI program manager at a global manufacturing company is onboarding new analysts. She explains that raw event logs and IP addresses collected from sensors do not yet constitute intelligence. What distinguishes threat intelligence from threat data?
    Question 2
    A SOC analyst at a financial institution receives a high-priority alert and needs to act immediately to block an active intrusion. The CTI team provides firewall rules and malicious IP lists derived from the ongoing attack. What type of threat intelligence is being provided?
      Question 3
      An executive team at a healthcare provider requests a briefing to understand the broader cyberthreat landscape and how nation-state actors might impact their industry over the next 12 months. Which type of threat intelligence best serves this audience?
        Question 4
        A threat intelligence analyst is documenting the responsibilities of her role for a new hire orientation guide. Which of the following tasks is most accurately aligned with the core responsibility of a cyber threat analyst?
          Question 5
          A risk committee at a regional bank compares their current reactive, signature-based detection model to a threat intelligence-driven approach. What is the primary advantage of a threat intelligence-led security model over traditional cybersecurity approaches?
            Question 6
            An intelligence team at a government agency is asked to explain who should consume different types of threat intelligence. A senior analyst notes that operational intelligence is often confused with tactical intelligence. Who is the primary consumer of operational threat intelligence?
              Question 7
              A CTI team lead at an MSSP is formalizing the organization's intelligence workflow. She wants to ensure that intelligence is consistently planned, collected, processed, analyzed, disseminated, and reviewed. Which framework describes this end-to-end intelligence production process?
                Question 8
                A threat intelligence manager at a cloud services company is developing a multi-year roadmap for her CTI program. She wants to align intelligence production to business objectives and ensure resources are focused on the most relevant threats. What is the primary purpose of a threat intelligence strategy?
                  Question 9
                  A newly hired threat intelligence analyst at a critical infrastructure firm asks her manager what differentiates intelligence from raw security data. Her manager explains using a three-tier hierarchy. Which statement correctly represents the relationship between data, information, and intelligence in a CTI context?
                    Question 10
                    An MSSP is evaluating the maturity of its threat intelligence capabilities. The team collects threat feeds and produces ad hoc reports but lacks a repeatable process or program governance structure. According to the Threat Intelligence Maturity Model, which level best describes this program?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top