EC-Council CTIA Module 2.1 Practice Test 001

This practice test covers Module 2 (Cyber Threats and Attack Frameworks) Sub-module 1 (Cyber Threats).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 2.1 Practice Test 001
10 questions • Single best answer
Question 1
A CTI lead at a federal government agency reviews intelligence about an intrusion campaign targeting defense contractors over 18 months. The attackers used custom malware, zero-day exploits, and operated with extreme patience and stealth. Which threat actor category most accurately describes this adversary?
    Question 2
    An analyst at a telecommunications company is categorizing threats for her risk register. She distinguishes threat actors with formal training, coordinated objectives, and purpose-built tools from those acting alone without technical skills who use downloaded exploit kits. Which pair of threat categories does this distinction represent?
      Question 3
      A healthcare organization's security team discovers that a privileged employee has been exfiltrating patient records to an external cloud storage account for several months. The individual used legitimate credentials and bypassed perimeter controls entirely. Which threat category best describes this incident?
        Question 4
        A CTI analyst is briefing a financial institution's board on threat actor motivations. She explains that cybercriminal groups pursue a primary objective that distinguishes them from nation-state actors and hacktivists. Which objective most distinctly characterizes cybercriminal threat actors?
          Question 5
          An incident response team at a major airline investigates an attack in which perpetrators defaced the company's website and published internal documents to expose alleged unethical labor practices. The attackers claimed responsibility publicly through social media. Which threat actor category best fits this profile?
            Question 6
            A CTI team at a regional bank identifies a pattern of opportunistic attacks exploiting an unpatched vulnerability using a freely available exploit framework. The attacker showed no ability to pivot further when initial access was limited and left distinctive, unsophisticated artifacts. Which threat actor classification best describes this adversary?
              Question 7
              A manufacturing company's CTI program manager is classifying threats for the annual threat landscape assessment. The team differentiates threats originating from the organization's own employees and contractors from those originating from outside the enterprise perimeter. Which threat classification framework aligns with this approach?
                Question 8
                A CTI analyst supporting a water utility is mapping threat actors targeting critical infrastructure. One category of adversary specifically aims to cause physical disruption, instill fear in civilian populations, or pressure governments by attacking essential services. Which threat category best describes this attacker?
                  Question 9
                  A CTI team is documenting motivations behind a threat actor who systematically targeted research universities, defense contractors, and technology companies to acquire advanced manufacturing process data. The campaign used spear-phishing and long-term persistence implants. Which objective is this adversary most clearly pursuing?
                    Question 10
                    An MSSP analyst is briefing a new enterprise client on threat categories they should prioritize. The client asks which category represents the highest degree of technical sophistication, greatest patience, and the most serious threat to crown-jewel assets over an extended period. Which category best answers this question?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top