Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

ECCouncil 312-39 Dumps

Page: 1 / 8
Total 100 questions

Certified SOC Analyst (CSA) Questions and Answers

Question 1

Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?

Options:

A.

Windows Event Log

B.

Web Server Logs

C.

Router Logs

D.

Switch Logs

Question 2

What does Windows event ID 4740 indicate?

Options:

A.

A user account was locked out.

B.

A user account was disabled.

C.

A user account was enabled.

D.

A user account was created.

Question 3

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

Options:

A.

Ransomware Attack

B.

DoS Attack

C.

DHCP starvation Attack

D.

File Injection Attack

Question 4

Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?

Options:

A.

Rate Limiting

B.

Egress Filtering

C.

Ingress Filtering

D.

Throttling

Question 5

Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?

Options:

A.

Planning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing

B.

Planning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations

C.

Planning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations

D.

Planning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical security recommendations

Question 6

Which of the following directory will contain logs related to printer access?

Options:

A.

/var/log/cups/Printer_log file

B.

/var/log/cups/access_log file

C.

/var/log/cups/accesslog file

D.

/var/log/cups/Printeraccess_log file

Question 7

Which of the following Windows features is used to enable Security Auditing in Windows?

Options:

A.

Bitlocker

B.

Windows Firewall

C.

Local Group Policy Editor

D.

Windows Defender

Question 8

Identify the type of attack, an attacker is attempting on website.

Options:

A.

Cross-site Scripting Attack

B.

Session Attack

C.

Denial-of-Service Attack

D.

SQL Injection Attack

Question 9

Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.

What Chloe is looking at?

Options:

A.

Error log

B.

System boot log

C.

General message and system-related stuff

D.

Login records

Question 10

John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.

Which of the following types of threat intelligence did he use?

Options:

A.

Strategic Threat Intelligence

B.

Technical Threat Intelligence

C.

Tactical Threat Intelligence

D.

Operational Threat Intelligence

Question 11

Rinni, SOC analyst, while monitoring IDS logs detected events shown in the figure below.

What does this event log indicate?

Options:

A.

Directory Traversal Attack

B.

XSS Attack

C.

SQL Injection Attack

D.

Parameter Tampering Attack

Question 12

Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?

Options:

A.

FISMA

B.

HIPAA

C.

PCI-DSS

D.

DARPA

Question 13

What type of event is recorded when an application driver loads successfully in Windows?

Options:

A.

Error

B.

Success Audit

C.

Warning

D.

Information

Question 14

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

Options:

A.

Nmap

B.

UrlScan

C.

ZAP proxy

D.

Hydra

Question 15

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.

Options:

A.

rule-based

B.

pull-based

C.

push-based

D.

signature-based

Question 16

Which attack works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

Options:

A.

Hybrid Attack

B.

Bruteforce Attack

C.

Rainbow Table Attack

D.

Birthday Attack

Question 17

John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.

Which of the following data source will he use to prepare the dashboard?

Options:

A.

DHCP/Logs capable of maintaining IP addresses or hostnames with IPtoName resolution.

B.

IIS/Web Server logs with IP addresses and user agent IPtouseragent resolution.

C.

DNS/ Web Server logs with IP addresses.

D.

Apache/ Web Server logs with IP addresses and Host Name.

Question 18

Which of the following factors determine the choice of SIEM architecture?

Options:

A.

SMTP Configuration

B.

DHCP Configuration

C.

DNS Configuration

D.

Network Topology

Question 19

A type of threat intelligent that find out the information about the attacker by misleading them is known as

.

Options:

A.

Threat trending Intelligence

B.

Detection Threat Intelligence

C.

Operational Intelligence

D.

Counter Intelligence

Question 20

Which of the following is a default directory in a Mac OS X that stores security-related logs?

Options:

A.

/private/var/log

B.

/Library/Logs/Sync

C.

/var/log/cups/access_log

D.

~/Library/Logs

Question 21

Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks.

What among the following should Wesley avoid from considering?

Options:

A.

Deserialization of trusted data must cross a trust boundary

B.

Understand the security permissions given to serialization and deserialization

C.

Allow serialization for security-sensitive classes

D.

Validate untrusted input, which is to be serialized to ensure that serialized data contain only trusted classes

Question 22

Which of the following can help you eliminate the burden of investigating false positives?

Options:

A.

Keeping default rules

B.

Not trusting the security devices

C.

Treating every alert as high level

D.

Ingesting the context data

Question 23

Which of the following Windows event is logged every time when a user tries to access the "Registry" key?

Options:

A.

4656

B.

4663

C.

4660

D.

4657

Question 24

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.

Identify the stage in which he is currently in.

Options:

A.

Post-Incident Activities

B.

Incident Recording and Assignment

C.

Incident Triage

D.

Incident Disclosure

Question 25

Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.

What does this event log indicate?

Options:

A.

Directory Traversal Attack

B.

Parameter Tampering Attack

C.

XSS Attack

D.

SQL Injection Attack

Question 26

The Syslog message severity levels are labelled from level 0 to level 7.

What does level 0 indicate?

Options:

A.

Alert

B.

Notification

C.

Emergency

D.

Debugging

Question 27

An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.

Original URL: &debit=100 Modified URL: &debit=10

Identify the attack depicted in the above scenario.

Options:

A.

Denial-of-Service Attack

B.

SQL Injection Attack

C.

Parameter Tampering Attack

D.

Session Fixation Attack

Question 28

Which of the following formula represents the risk?

Options:

A.

Risk = Likelihood × Severity × Asset Value

B.

Risk = Likelihood × Consequence × Severity

C.

Risk = Likelihood × Impact × Severity

D.

Risk = Likelihood × Impact × Asset Value

Question 29

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

Options:

A.

SystemDrive%\inetpub\logs\LogFiles\W3SVCN

B.

SystemDrive%\LogFiles\inetpub\logs\W3SVCN

C.

%SystemDrive%\LogFiles\logs\W3SVCN

D.

SystemDrive%\ inetpub\LogFiles\logs\W3SVCN

Question 30

What is the process of monitoring and capturing all data packets passing through a given network using different tools?

Options:

A.

Network Scanning

B.

DNS Footprinting

C.

Network Sniffing

D.

Port Scanning

Page: 1 / 8
Total 100 questions