EC-Council CTIA Module 2.3 Practice Test 001

This practice test covers Module 2 (Cyber Threats and Attack Frameworks) Sub-module 3 (Cyber Kill Chain).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 2.3 Practice Test 001
10 questions • Single best answer
Question 1
A threat intelligence analyst supporting a government defense contractor reviews network telemetry and discovers evidence of passive scanning against external web servers and systematic LinkedIn enumeration of employees in engineering roles. Which phase of the Cyber Kill Chain does this activity represent?
    Question 2
    A SOC team at an energy utility receives threat intelligence indicating that an adversary group bundled a malicious macro into a document masquerading as a regulatory compliance form. No payload has been delivered to any employee yet. Which Cyber Kill Chain phase is the adversary currently in?
      Question 3
      A CTI team at a financial institution identifies that a threat actor sent a malicious Office document attached to spear-phishing emails targeting 40 employees in the accounts payable department. The document has been received but not yet opened. Which Cyber Kill Chain phase does this activity represent?
        Question 4
        A threat hunter at a healthcare network discovers that an adversary triggered a remote code execution vulnerability in an unpatched VPN appliance, causing arbitrary commands to run under the appliance's service account context. Which phase of the Cyber Kill Chain does this activity represent?
          Question 5
          An MSSP analyst investigating a client breach finds that after the initial compromise, the adversary dropped a remote access trojan into a system's startup folder and created a scheduled task to re-execute the RAT every 15 minutes. Which phase of the Cyber Kill Chain does this behavior represent?
            Question 6
            A CTI team at an insurance company observes that a compromised workstation is generating encrypted HTTPS traffic to an unknown external domain at 10-minute intervals, even during non-business hours. Which Cyber Kill Chain phase does this beaconing activity represent?
              Question 7
              A CTI analyst mapping an intrusion campaign finds that after maintaining C2 access for three weeks, the adversary began bulk-copying sensitive merger documents to a staging folder and transferring them to an external cloud storage service. Which Cyber Kill Chain phase does this represent?
                Question 8
                A CTI program manager is training new analysts on attack frameworks. She explains that while both models support threat analysis, one provides a linear seven-phase attack sequence while the other offers a granular, non-linear matrix of adversary techniques mapped to tactics. Which statement best captures this distinction between the Cyber Kill Chain and MITRE ATT&CK?
                  Question 9
                  A CTI analyst is helping a security architecture team identify where to invest in controls to disrupt an adversary campaign at the earliest possible Kill Chain phase. The analyst explains that disrupting the adversary before any access is achieved is most cost-effective. Which Kill Chain phases represent the best early disruption points before the adversary breaches the perimeter?
                    Question 10
                    A threat intelligence team at a cloud services provider is onboarding new analysts. A senior analyst explains that the Cyber Kill Chain model was developed by Lockheed Martin and adapted from an existing military doctrine. Which military targeting concept forms the conceptual foundation of the Cyber Kill Chain?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top