EC-Council CTIA Module 1.5 Practice Test 001

This practice test covers Module 1 (Introduction to Threat Intelligence) Sub-module 5 (Threat Intelligence in the Cloud Environment).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 1.5 Practice Test 001
10 questions • Single best answer
Question 1
A CTI analyst at a cloud-native e-commerce company is building the organization's first threat intelligence capability. When comparing cloud environments to traditional on-premise infrastructure, which characteristic most significantly complicates continuous threat intelligence collection in the cloud?
    Question 2
    A threat intelligence engineer at a financial services company migrating workloads to AWS is defining the scope of internal CTI monitoring. Under the cloud shared responsibility model for IaaS, which security layer remains the customer's primary responsibility and thus the primary focus of the CTI program?
      Question 3
      A SOC analyst at a healthcare system recently migrated critical workloads to AWS. The security team needs continuous, ML-driven threat detection that analyzes CloudTrail logs, VPC Flow Logs, and DNS query logs for anomalous activity without requiring the team to manage detection infrastructure. Which AWS-native service meets this requirement?
        Question 4
        During a cloud incident investigation, a CTI analyst at a global logistics company determines that attackers obtained AWS access keys from a publicly exposed GitHub repository, provisioned hundreds of EC2 instances across multiple regions, and deployed cryptocurrency mining software at scale. Which threat actor motivation best characterizes this campaign?
          Question 5
          A threat intelligence lead at a multinational manufacturing company oversees CTI operations across AWS, Azure, and GCP. She is documenting the primary challenge unique to multi-cloud threat intelligence operations. Which challenge is most distinct to multi-cloud architectures compared to single-cloud or on-premise deployments?
            Question 6
            A cloud security architect at an insurance company is designing threat intelligence integration for containerized workloads running in Kubernetes on GCP. The team needs runtime threat detection, vulnerability scanning, and TI feed integration specifically for cloud workloads. Which platform category is best suited for this requirement?
              Question 7
              A CTI analyst at a professional services firm is asked to improve threat intelligence coverage for the company's SaaS portfolio, including Microsoft 365 and Salesforce. The team needs visibility into user behavior anomalies, unauthorized data access, and shadow IT usage across these platforms. Which tool provides the most direct source of SaaS-specific threat intelligence?
                Question 8
                A cloud security manager at an energy company wants a capability that continuously identifies misconfigurations, policy deviations, and security risks in Azure resource configurations — feeding the CTI team with proactive exposure context before attackers can exploit them. Which tool category directly serves this function?
                  Question 9
                  A threat intelligence analyst at a SaaS technology startup is building a cloud-native data collection plan for their AWS-hosted environment. She is identifying telemetry sources that provide threat-relevant signals for the CTI program. Which of the following represents a cloud-native AWS data source for threat intelligence collection?
                    Question 10
                    A threat intelligence lead at a global technology company is briefing the cloud security architecture team on adapting the Threat Intelligence Lifecycle for cloud operations. She explains that one phase requires the most significant adaptation because cloud environments change continuously and intelligence becomes stale far faster than in static on-premise environments. Which lifecycle phase requires the most significant re-engineering for cloud-speed operations?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top