In CEH v13 Module 01: Information Security Fundamentals, the types of threat intelligence are categorized as Strategic, Tactical, Operational, and Technical, each serving different security roles.
Tactical Threat Intelligence – Correct Answer
Definition: Provides information in a machine-readable format such as indicators of compromise (IOCs) — including IP addresses, file hashes, URLs, domains, and signatures.
Purpose: Used to update security appliances like firewalls, IDS/IPS, endpoint protection to automatically detect and block threats in real-time.
Roma used threat intelligence in this exact way — automating detection and blocking via security tools.
Why Other Options Are Incorrect:
A. Technical Threat Intelligence: Often overlaps with tactical but usually refers to low-level indicators used for internal analysis, not device-ready feeds.
B. Operational Threat Intelligence: Focuses on specific campaigns, attacker TTPs, and is generally not automated or directly used in security appliances.
D. Strategic Threat Intelligence: High-level, non-technical insights for executives and decision-makers — used for long-term planning, not immediate threat blocking.
[Reference:, Module 01 – Threat Intelligence Types and Usage Scenarios, CEH iLabs: Ingesting IOCs into a Firewall for Tactical Threat Defense, CEH v13 eBook: Threat Intelligence Integration into Defensive Systems, , ]