Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your 312-39 CSA Exam

Page: 13 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 49

Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks.

What among the following should Wesley avoid from considering?

Options:

A.

Deserialization of trusted data must cross a trust boundary

B.

Understand the security permissions given to serialization and deserialization

C.

Allow serialization for security-sensitive classes

D.

Validate untrusted input, which is to be serialized to ensure that serialized data contain only trusted classes

Question 50

Pearl is a Level 1 SOC analyst at a global financial institution using SQL Server to store sensitive customer information. She investigates an alert showing multiple failed web app logins from the same IP, followed by a successful login as a server administrator. She then reviews SQL Server logs and finds the attacker used compromised credentials to access the SQL Server database. Which log will help identify whether the intruder performed unauthorized modifications in the database?

Options:

A.

Transaction log

B.

Security log

C.

Maintenance log

D.

Audit log

Question 51

You are working as a SOC analyst for a cloud-based service provider that relies on PostgreSQL databases to store critical customer data. During a security review, you discover that logs are not being generated for failed authentication attempts, slow queries, or database errors. This lack of visibility is making it difficult to detect threats and investigate suspicious activity. To ensure PostgreSQL captures and stores logs for centralized monitoring and forensic analysis, which configuration parameter should you enable?

Options:

A.

logging-collector

B.

log_collector

C.

loggingcollector

D.

logging-collector (with space)

Question 52

During routine monitoring, the SIEM detects an unusual spike in outbound data transfer from a critical database server. The typical outbound traffic for this server is around 5 MB/hour, but in the past 10 minutes, it has sent over 500 MB to an external IP address. No predefined signatures match this activity, but the SIEM raises an alert due to deviations from the server’s normal behavior profile. Which detection method is responsible for this alert?

Options:

A.

Heuristic-based detection

B.

Signature-based detection

C.

Rule-based detection

D.

Anomaly-based detection

Page: 13 / 15
Total 200 questions