EC-Council CTIA Module 4.1 Practice Test 001

This practice test covers Module 4 (Data Collection and Processing) Sub-module 1 (Threat Intelligence Data Collection).

These questions are inspired by the EC-Council CTIA exam and are designed to help you test your knowledge of cyber threat intelligence, threats and frameworks, and other related topics. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CTIA exam.

Note: CTIA is a registered trademark of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CTIA practice tests based on specific modules and sub-modules, click that link

EC-Council CTIA Module 4.1 Practice Test 001
10 questions • Single best answer
Question 1
A CTI analyst at a regional electric utility is building a new data collection capability from scratch. Before selecting tools and sources, which foundational step should be completed first?
    Question 2
    A SOC team at a financial institution receives both structured STIX/TAXII feeds and unstructured threat reports from a vendor. Which statement best distinguishes structured from unstructured threat data?
      Question 3
      A threat intelligence team is categorizing its data sources as internal or external. Which source is best classified as an internal threat intelligence data source?
        Question 4
        An analyst is conducting OSINT collection to support a threat assessment of a suspected nation-state actor. Which activity is best described as OSINT collection?
          Question 5
          A CTI analyst collects intelligence by analyzing captured malware samples and reverse-engineering their command-and-control infrastructure. Which type of intelligence collection does this best represent?
            Question 6
            A threat intelligence program manager is evaluating candidate data sources for inclusion in the collection plan. Which factor is most critical when assessing the reliability of a threat intelligence source?
              Question 7
              A CTI team is designing a collection plan and must document collection sources, assigned responsibilities, and the intelligence requirements each source addresses. What is the primary purpose of a threat intelligence collection plan?
                Question 8
                A CTI team at a managed security service provider uses Python scripts to automate collection of IP reputation data from multiple open-source threat APIs. What is the primary advantage of using scripting for threat data collection?
                  Question 9
                  A CTI analyst is profiling adversary infrastructure using passive DNS records, WHOIS registration data, and BGP routing tables. Which category of data collection does this activity represent?
                    Question 10
                    A CTI team receives tasking to collect intelligence on ransomware groups. The team lead notes that some high-value sources exist only on invitation-only dark web forums. What type of collection challenge does this scenario describe?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top