Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

312-39 ECCouncil Exam Lab Questions

Page: 15 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 57

A manufacturing company is deploying a SIEM system and wants to improve both security monitoring and regulatory compliance. During planning, the team uses an output-driven approach, starting with use cases that address unauthorized access to production control systems. They configure data sources and alerts specific to this use case, ensuring actionable alerts without excessive false positives. After validating success, they move on to use cases related to supply chain disruptions and malware detection. What is the primary advantage of using an output-driven approach in SIEM deployment?

Options:

A.

The company avoids the need to collect logs from non-critical systems.

B.

The SIEM system can automatically block all unauthorized access attempts.

C.

The company can create more complex use cases with greater scope.

D.

The SOC team can respond to all incidents in real time without delays.

Question 58

Jennifer, a SOC analyst, initiates an investigation after receiving an alert about potential unauthorized activity on Marcus's workstation. She starts by retrieving EDR logs from the endpoint, analyzing network traffic patterns in the Security Information and Event Management (SIEM) system, and inspecting email gateway logs for signs of malicious attachments. Her objective is to determine whether this alert represents a legitimate security incident. In which phase of the Incident Response process is Jennifer currently operating?

Options:

A.

Incident Triage

B.

Evidence Gathering and Forensic Analysis

C.

Notification

D.

Incident Recording and Assignment

Question 59

A financial services company implements a SIEM solution to enhance cybersecurity. Despite deployment, it fails to detect known attacks or suspicious activities. Although reports are generated, the team struggles to interpret them. Investigation shows that critical logs from firewalls, IDS, and endpoint devices are not reaching the SIEM. What is the reason the SIEM is not functioning as expected?

Options:

A.

Improper configuration or design of the SIEM deployment architecture

B.

Lack of understanding of SIEM features and capabilities

C.

Difficulty handling the volume of collected log data

D.

Delays in log collection and analysis due to system performance issues

Question 60

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs.

What does these TTPs refer to?

Options:

A.

Tactics, Techniques, and Procedures

B.

Tactics, Threats, and Procedures

C.

Targets, Threats, and Process

D.

Tactics, Targets, and Process

Page: 15 / 15
Total 200 questions