EC-Council CTIA Module 3.6 Practice Test 001

This practice test covers Module 3 (Requirements, Planning, Direction, and Review) Sub-module 6 (Threat Intelligence Sharing).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 3.6 Practice Test 001
10 questions • Single best answer
Question 1
A threat intelligence analyst at a regional bank receives an intelligence report marked TLP:AMBER from an ISAC partner. Which sharing constraint does this classification impose on the receiving organization?
    Question 2
    A CTI team needs to automate the exchange of machine-readable threat intelligence with a sector ISAC. They require a standard that structures intelligence objects and a protocol that transports them. Which pairing satisfies both requirements?
      Question 3
      A cybersecurity manager at a mid-size retail firm wants to join a sharing community but cannot qualify for a sector-specific ISAC. Which alternative body is best suited for organizations that do not align to a single critical infrastructure sector?
        Question 4
        A CTI program manager at a large financial institution coordinates intelligence dissemination to ten downstream community banks without expecting reciprocal contributions from those partners. Which threat intelligence sharing model does this arrangement best represent?
          Question 5
          An intelligence lead at a critical infrastructure operator wants to formalize sharing with a newly identified peer organization. Before exchanging sensitive operational intelligence, which step should the analyst complete first?
            Question 6
            A threat intelligence manager is building the business case for joining a sector ISAC. Which outcome most directly demonstrates the strategic value of participating in structured threat intelligence sharing?
              Question 7
              A government CTI team prepares to share a threat report with private-sector partners through an ISAC portal. The report contains victim attribution data that must not be disclosed. Which technique should the team apply before disseminating the report?
                Question 8
                A CTI team at a healthcare network identifies an active ransomware campaign targeting hospital billing systems. To notify other healthcare organizations facing the same threat quickly and through a sector-aligned channel, which sharing partner type is most appropriate?
                  Question 9
                  A CTI team evaluates two distribution models for delivering IoC feeds. In one model, indicators are automatically sent to partners as they are produced. In the second, partners query a central repository when they need data. Which terms correctly label these two models?
                    Question 10
                    A threat intelligence program manager reviews the organization's sharing posture and notes all intelligence exchange relies on informal email with no agreed format, frequency, or classification scheme. Which characterization best describes this approach?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top