100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CREST Registered Threat Intelligence Analyst (CRTIA) Practice Exam (100 Questions) QUESTIONS AND CORRECT ANSWERS GRADE A

Rating
-
Sold
-
Pages
37
Grade
A+
Uploaded on
18-01-2026
Written in
2025/2026

CREST Registered Threat Intelligence Analyst (CRTIA) Practice Exam (100 Questions) QUESTIONS AND CORRECT ANSWERS GRADE A

Institution
Engineering Technology
Module
Engineering technology











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Engineering technology
Module
Engineering technology

Document information

Uploaded on
January 18, 2026
Number of pages
37
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • registered threa

Content preview

CREST Registered Threat Intelligence Analyst (CRTIA) Practice Exam (100 Questions)
QUESTIONS AND CORRECT ANSWERS GRADE A



1. What is the primary objective of the Diamond Model of Intrusion Analysis?

A) To classify malware families

B) To map adversary infrastructure

C) To analyze intrusion activity through four core features: adversary, capability,
infrastructure, victim

D) To calculate risk scores for vulnerabilities

**ANSWER: C**

**EXPLANATION:** The Diamond Model provides a structured approach for analyzing
intrusions by examining relationships between adversaries, their capabilities,
infrastructure used, and victims targeted.



2. Which of the following BEST describes the difference between Indicators of Compromise
(IOCs) and Indicators of Attack (IOAs)?

A) IOCs are technical artifacts, IOAs are behavioral patterns

B) IOCs are reactive, IOAs are proactive

C) IOCs are always hash-based, IOAs are always network-based

D) IOCs focus on what happened, IOAs focus on what is happening

**ANSWER: B**

**EXPLANATION:** IOCs are forensic artifacts used for detection after compromise, while
IOAs are behavioral indicators used to detect attacks in progress before damage occurs.



3. According to the MITRE ATT&CK framework, which tactic involves "developing and
acquiring capabilities that can be used for targeting"?

A) Resource Development

B) Initial Access

,C) Persistence

D) Privilege Escalation

**ANSWER: A**

**EXPLANATION:** Resource Development (TA0042) involves adversaries building
capabilities before conducting operations, including developing malware, acquiring
infrastructure, or establishing accounts.



4. What is the PRIMARY purpose of the Cyber Kill Chain framework?

A) To classify malware persistence mechanisms

B) To describe stages of a targeted cyber attack from reconnaissance to data exfiltration

C) To calculate the financial impact of breaches

D) To map network vulnerabilities

**ANSWER: B**

**EXPLANATION:** Developed by Lockheed Martin, the Cyber Kill Chain describes seven
stages of a cyber attack: Reconnaissance, Weaponization, Delivery, Exploitation,
Installation, Command & Control, and Actions on Objectives.



5. Which intelligence collection discipline involves gathering information from publicly
available sources?

A) OSINT

B) HUMINT

C) SIGINT

D) GEOINT

**ANSWER: A**

**EXPLANATION:** Open Source Intelligence (OSINT) involves collecting and analyzing
information from publicly available sources such as websites, social media, forums, and
public databases.

,6. In the context of threat intelligence, what does TTP stand for?

A) Tactics, Techniques, and Procedures

B) Threat Tracking Protocol

C) Technical Threat Profile

D) Targeted Threat Pattern

**ANSWER: A**

**EXPLANATION:** TTPs refer to the patterns of activities or methods associated with
specific threat actors, describing how they operate across the attack lifecycle.



7. Which of the following is a key characteristic of Strategic Threat Intelligence?

A) Focused on specific indicators like IP addresses and hashes

B) Used by SOC analysts for immediate incident response

C) Provides high-level insights for executive decision-making

D) Contains technical details about malware behavior

**ANSWER: C**

**EXPLANATION:** Strategic intelligence is broad, long-term intelligence used by
executives and decision-makers to understand the threat landscape, risk posture, and
inform security strategy.



8. What is the PRIMARY purpose of the STIX (Structured Threat Information Expression)
framework?

A) To automate malware analysis

B) To standardize the representation of cyber threat information

C) To encrypt threat intelligence feeds

D) To classify threat actor motivations

**ANSWER: B**

, **EXPLANATION:** STIX is a standardized language for describing cyber threat information
in a consistent and machine-readable format, facilitating sharing and analysis.



9. According to the Intelligence Cycle, which phase involves transforming collected
information into usable intelligence?

A) Collection

B) Processing

C) Analysis

D) Dissemination

**ANSWER: B**

**EXPLANATION:** The Processing phase involves converting raw collected data into a
form suitable for analysis, including translation, decryption, and data reduction.



10. What is the difference between a Threat Actor and an Advanced Persistent Threat
(APT)?

A) APTs are always state-sponsored, threat actors can be anyone

B) APTs refer to sophisticated, organized groups with sustained operations; threat actors is
a broader term

C) Threat actors only target financial gain, APTs target intellectual property

D) APTs are always detected within 24 hours, threat actors may operate undetected for
years

**ANSWER: B**

**EXPLANATION:** APT refers specifically to sophisticated, often state-sponsored groups
conducting prolonged, targeted campaigns. Threat actor is a broader term encompassing
all individuals or groups conducting cyber attacks.



11. Which of the following BEST describes the purpose of the CybOX (Cyber Observable
Expression) language?

A) To describe network security policies

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUANKADA Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
315
Member since
4 year
Number of followers
249
Documents
3878
Last sold
2 weeks ago
Professionalacademictutor

On this page, you find all documents, package deals, and flashcards offered by seller

3.8

43 reviews

5
25
4
4
3
2
2
6
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions