Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CSA 312-39 Exam Dumps

Page: 9 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 33

Which of the following formula represents the risk?

Options:

A.

Risk = Likelihood × Severity × Asset Value

B.

Risk = Likelihood × Consequence × Severity

C.

Risk = Likelihood × Impact × Severity

D.

Risk = Likelihood × Impact × Asset Value

Question 34

What type of event is recorded when an application driver loads successfully in Windows?

Options:

A.

Error

B.

Success Audit

C.

Warning

D.

Information

Question 35

What does [-n] in the following checkpoint firewall log syntax represents?

fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]

Options:

A.

Speed up the process by not performing IP addresses DNS resolution in the Log files

B.

Display both the date and the time for each log record

C.

Display account log records only

D.

Display detailed log chains (all the log segments a log record consists of)

Question 36

Which of the following command is used to enable logging in iptables?

Options:

A.

$ iptables -B INPUT -j LOG

B.

$ iptables -A OUTPUT -j LOG

C.

$ iptables -A INPUT -j LOG

D.

$ iptables -B OUTPUT -j LOG

Page: 9 / 15
Total 200 questions