EC-Council CTIA Module 3.2 Practice Test 001

This practice test covers Module 3 (Requirements, Planning, Direction, and Review) Sub-module 2 (Requirements Analysis).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 3.2 Practice Test 001
10 questions • Single best answer
Question 1
A threat intelligence analyst at a global logistics firm is partnering with the CISO and business unit leaders to determine what the CTI program must focus on first. They need a formal construct for documenting the organization's highest-priority intelligence needs. Which term best describes this construct?
    Question 2
    A CTI team lead is using the MoSCoW method to categorize requirements gathered from SOC and executive stakeholders. One requirement—tracking nation-state threat actors targeting the organization's sector—is considered non-negotiable for program success. Which MoSCoW category applies?
      Question 3
      An MSSP's CTI team is about to begin active intelligence collection on behalf of a financial services client. The team needs a documented framework defining acceptable collection methods, legal boundaries, and permissible targets. What CTI program element governs these boundaries?
        Question 4
        A threat intelligence program manager at a regional bank is defining the scope of a newly approved CTI program. She needs a foundational document that formally establishes program boundaries, objectives, and stakeholders. Which document serves this purpose?
          Question 5
          A CTI analyst has documented what the executive team needs to know about ransomware groups targeting critical infrastructure. Her manager now asks her to specify which data sources and acquisition methods will satisfy those defined needs. What type of requirement is the manager requesting?
            Question 6
            During a CTI program requirements workshop, a stakeholder requests real-time tracking of all dark web forums globally. The program manager determines this is technically infeasible within the current budget and outside the program's mandate. Which MoSCoW category should be assigned?
              Question 7
              A CTI team lead at an enterprise SOC is initiating the requirements analysis phase for a new intelligence program. She must ensure requirements reflect tactical, operational, and strategic intelligence needs. Which stakeholder groups should she engage?
                Question 8
                An intelligence analyst at a government contractor is translating the CISO's broad concern about supply chain attacks into specific, structured questions the CTI team can research and answer. Which term describes the structured questions she is producing?
                  Question 9
                  A threat intelligence analyst at a financial institution notices that PIRs approved six months ago no longer reflect the organization's threat environment following a major acquisition. What is the appropriate course of action?
                    Question 10
                    A CTI team at a critical infrastructure company has defined PIRs around ICS-targeting threat actors but finds that existing data sources provide insufficient coverage to fully answer those requirements. What does this condition represent?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top