EC-Council CTIA Module 2.5 Practice Test 001

This practice test covers Module 2 (Cyber Threats and Attack Frameworks) Sub-module 5 (Indicators of Compromise).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 2.5 Practice Test 001
10 questions • Single best answer
Question 1
A threat hunter at a telecommunications company is briefing junior analysts on detection fundamentals. She explains the role of indicators of compromise in identifying malicious activity. Which statement best defines an indicator of compromise (IoC)?
    Question 2
    A SOC analyst at an energy company is reviewing the Pyramid of Pain to prioritize threat detection. His team wants to focus on indicators that, when detected and blocked, cause the greatest disruption to an adversary. Which indicator type sits at the top of the Pyramid of Pain?
      Question 3
      An incident response team at a retail company shares SHA-256 hashes of malware samples found during an investigation. A senior analyst warns the team not to rely heavily on hash-based detection. Why are hash values considered the lowest-value indicators on the Pyramid of Pain?
        Question 4
        A CTI analyst at a healthcare provider is classifying IoCs collected during a phishing campaign investigation. She categorizes a C2 server IP address as an atomic indicator. Which of the following best describes atomic indicators of compromise?
          Question 5
          A threat intelligence team at a financial institution flags a set of malicious IP addresses and shares them across their ISAC community. A peer analyst notes that actors seldom feel significant pain from IP-based blocking. Why do IP addresses rank low on the Pyramid of Pain?
            Question 6
            During a post-incident review at a cloud services provider, the security team identifies suspicious registry key modifications on endpoints and unusual outbound DNS queries to a recently registered domain. The team lead asks analysts to separate host-based from network-based IoCs. Which of the following is a network-based IoC?
              Question 7
              A threat analyst at a government agency is reviewing logs after detecting a lateral movement event. She identifies a pattern of failed authentication attempts followed by successful logins across multiple systems within minutes. This multi-event detection approach is best described as which type of indicator?
                Question 8
                An analyst at a managed detection and response provider is building detection signatures by algorithmically combining email header fields, attachment metadata, and sender IP reputation scores into a single composite artifact. The resulting indicator is derived from multiple correlated data elements. This is an example of which IoC category?
                  Question 9
                  A CTI team at a critical infrastructure company confirms that an adversary group consistently uses a commercially available remote access tool for maintaining persistence. Disrupting this capability requires the adversary to find or build a replacement tool. Where do tools fall on the Pyramid of Pain, and why?
                    Question 10
                    A threat hunting team at an MSSP is debating whether to invest in IoC-based detection or TTP-based detection strategies. The team lead argues that TTP-based detection provides more durable long-term coverage. Why are TTPs considered more valuable than atomic IoCs for sustained threat detection?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top