EC-Council CTIA Module 2.2 Practice Test 001

This practice test covers Module 2 (Cyber Threats and Attack Frameworks) Sub-module 2 (Advanced Persistent Threats).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 2.2 Practice Test 001
10 questions • Single best answer
Question 1
An incident response team at a pharmaceutical company discovers that an adversary maintained covert access to drug development servers for 14 months, exfiltrated research data in small increments, and avoided triggering any alerts throughout the campaign. Which set of characteristics most accurately defines this type of threat actor?
    Question 2
    A CTI analyst reviewing a breach at a logistics company finds that the adversary used spear-phishing emails crafted with employee names, vendor details, and a spoofed procurement domain to gain an initial foothold into the corporate network. Which phase of the APT lifecycle does this activity represent?
      Question 3
      A CTI analyst at a technology company is documenting pre-attack behavior attributed to an APT group. The adversary researched employee LinkedIn profiles, organizational hierarchies, vendor relationships, and public procurement documents over several weeks before any technical intrusion activity began. Which APT lifecycle phase does this represent?
        Question 4
        A SOC team at an energy company investigates a compromised workstation and finds custom backdoors installed in scheduled tasks and registry run keys, encrypted C2 channels masquerading as legitimate HTTPS traffic, and evidence that attacker tools were removed after each session to minimize artifacts. Which APT tactic is most clearly illustrated?
          Question 5
          An analyst at a defense contractor's CTI team determines that an adversary gained initial access via a compromised vendor account, then used pass-the-hash techniques and legitimate remote administration tools to access 12 internal systems across six weeks without triggering alerts. Which APT lifecycle phase is this?
            Question 6
            A financial institution's risk team asks its CTI lead to explain why APT intrusions are more difficult to detect and remediate than typical cybercriminal attacks. Which characteristic most clearly differentiates an APT from a financially motivated cybercriminal operation?
              Question 7
              During a breach investigation at a government contractor, forensic analysis shows the adversary used a compromised standard user account, then spent three weeks exploiting a local kernel vulnerability to gain domain administrator rights before moving to sensitive project repositories. Which APT lifecycle phase does this describe?
                Question 8
                A CISO at a biotech firm presents findings from a year-long breach investigation. The adversary's final phase involved packaging research files into encrypted RAR archives, staging them on a compromised internal server, and transmitting them in small bursts to a cloud storage provider over several weeks. Which APT lifecycle phase does this represent?
                  Question 9
                  An intelligence briefing prepared for a government agency profiles a threat group that exclusively targets military research institutions, aerospace companies, and defense contractors with no ransom demands and no public claims of responsibility. All compromises involved multi-stage persistence and long-duration collection. Which objective most likely drives this APT group?
                    Question 10
                    After establishing persistence in a manufacturing firm's environment, an adversary spent four weeks scanning internal network segments, mapping Active Directory trust relationships, and enumerating file shares to locate proprietary process control documentation before taking further action. Which APT lifecycle phase is described?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top