Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

All 312-39 Test Inside ECCouncil Questions

Page: 5 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 17

Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to find the purpose and scope of the planned incident response capabilities.

What is he looking for?

Options:

A.

Incident Response Intelligence

B.

Incident Response Mission

C.

Incident Response Vision

D.

Incident Response Resources

Question 18

You are working at Tech Solutions, a global technology firm. Your team detects an adversary attempting to bypass authentication controls and escalate privileges within the enterprise network. To counter the threat, you implement credential encryption, behavioral analytics, and process isolation. Your approach follows a structured framework that systematically maps defensive techniques to known adversarial tactics, allowing you to anticipate and mitigate evolving cyber threats. Which framework did you choose to apply in this scenario?

Options:

A.

Systems Security Engineering CMM

B.

MITRE D3FEND Framework

C.

Cybersecurity Capability Maturity Model

D.

NIST Cybersecurity Framework 2.0

Question 19

A mid-sized financial institution’s SOC is overwhelmed by thousands of daily alerts, many based on Indicators of Compromise (IoCs) such as suspicious IPs, hashes, and domains. These alerts lack context about whether they truly pose a threat. Analysts waste time on low-priority incidents while severe threats may be missed. The team lacks tools and intelligence to correlate IoCs with real-world threats, making prioritization difficult and causing alert fatigue. Which poses the greatest challenge in this environment?

Options:

A.

Malware-centric and CTI are not equivalent

B.

Information overload

C.

Budget and enterprise skill

D.

Distinguishing IoC from CTI

Question 20

ABC is a multinational company with multiple offices across the globe, and you are working as an L2 SOC analyst. You are implementing a centralized logging solution to enhance security monitoring. You must ensure that log messages from routers, firewalls, and servers across multiple remote offices are efficiently collected and forwarded to a central syslog server. To streamline this process, an intermediate component is deployed to receive log messages from different devices and forward them to the main syslog server. Which component in the syslog infrastructure performs this function?

Options:

A.

Syslog Database

B.

Syslog Collector

C.

Syslog Listener

D.

Syslog Relay

Page: 5 / 15
Total 200 questions