EC-Council CTIA Module 2.4 Practice Test 001

This practice test covers Module 2 (Cyber Threats and Attack Frameworks) Sub-module 4 (MITRE ATT\&CK and Diamond Model).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 2.4 Practice Test 001
10 questions • Single best answer
Question 1
A CTI program manager at a large retail organization is structuring threat behavior data from a recent campaign involving credential harvesting via phishing and lateral movement using stolen tokens. She wants to map adversary behaviors to named objectives with associated procedure examples. Which framework is best suited for this purpose?
    Question 2
    A SOC analyst at a healthcare network detects that an attacker used scheduled tasks to maintain persistence on compromised workstations following initial access via a phishing email. The analyst wants to reference the specific adversary behavior in MITRE ATT&CK. What is the correct ATT&CK classification for this behavior?
      Question 3
      An analyst at a financial institution is building a threat intelligence report and needs to explain the relationship between tactics and techniques in MITRE ATT&CK. A junior analyst is confused about which element represents the adversary's goal versus the method. Which statement correctly describes this relationship?
        Question 4
        An incident response team at a manufacturing firm asks the CTI team to compare the adversary techniques observed during a recent intrusion against the organization's existing detection controls, and identify which techniques have no corresponding detection coverage. Which ATT&CK use case does this scenario best represent?
          Question 5
          A threat intelligence analyst at an MSSP receives an intrusion report describing the following elements: the attacking group (APT29), the targeted organization (a fintech startup), the C2 domains used (infrastructure), and the malware family deployed (capability). Which analytical model organizes these four elements as its core vertices for intrusion analysis?
            Question 6
            An analyst applies the Diamond Model to investigate an intrusion at a logistics company. She identifies the adversary's C2 server (infrastructure) communicating directly with the victim's compromised web server. In the Diamond Model, which two vertices are connected by this observed relationship?
              Question 7
              A government agency's CTI team is analyzing multiple intrusion events attributed to the same threat group across five different victim organizations over 18 months. They want to link events by shared adversary TTPs and infrastructure rather than treating each intrusion as isolated. Which Diamond Model concept best supports this cross-event analysis?
                Question 8
                An intelligence lead is briefing the CISO of a cloud services provider on a recent intrusion. She uses MITRE ATT&CK to explain adversary behaviors but must connect technical findings to business risk. The CISO asks which ATT&CK component represents the adversary's overall strategic intent at each stage of the attack. What is the correct answer?
                  Question 9
                  A CTI team at a financial institution applies the Diamond Model to a spear-phishing intrusion. They have positively identified the malware strain used and the C2 domains, and the victim organization is known. However, they cannot conclusively link the campaign to any known threat actor. Which Diamond Model vertex represents the primary analytical confidence gap in this scenario?
                    Question 10
                    An MSSP threat analyst is enriching an intelligence report on a ransomware campaign. The adversary executed PowerShell commands via Windows Management Instrumentation (WMI) to run the encryption payload. The analyst needs to correctly represent this behavior in MITRE ATT&CK at its proper hierarchical level. What is the accurate ATT&CK representation?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top