Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CSA 312-39 Exam Questions and Answers PDF

Page: 6 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 21

You are a SOC analyst at a leading financial institution tasked with developing a comprehensive threat model to safeguard critical assets: sensitive customer data, online banking applications, and real-time payment processing systems. The organization has observed increased targeted attacks on financial entities, including credential theft, account takeovers, and sophisticated phishing. Senior management is concerned about long-term financial and reputational damage. You need intelligence providing insights into high-level risks, geopolitical threats, and emerging cybercriminal strategies with long-term implications for security posture. Which type of threat intelligence are you seeking?

Options:

A.

Strategic threat intelligence

B.

Technical threat intelligence

C.

Tactical threat intelligence

D.

Operational threat intelligence

Question 22

A security analyst in a multinational corporation’s Threat Intelligence team is tasked with enhancing detection of stealthy malware infections. During an investigation, the analyst observes an unusually high volume of DNS requests directed toward domains that follow patterns commonly associated with Domain Generation Algorithms (DGAs). Recognizing that these automated domain queries could indicate malware attempting to establish communication with command-and-control (C2) infrastructure, the analyst realizes existing detection may be insufficient. The security team needs to define intelligence requirements, including identifying critical data sources, refining detection criteria, and improving monitoring strategies. Which stage of the Cyber Threat Intelligence (CTI) process does this align with?

Options:

A.

Automated tool

B.

Requirement analysis

C.

Filtering CTI

D.

Intelligence buy-in

Question 23

A threat hunter analyzing an infected endpoint finds that malicious processes keep reappearing even after termination, making traditional remediation ineffective. The user reports slowdowns, abnormal pop-ups, and unauthorized application launches. Deeper inspection reveals multiple scheduled tasks executing unknown scripts at intervals, along with suspicious registry modifications enabling automatic execution on startup. The endpoint makes intermittent encrypted outbound connections to an unclassified external server. The organization also observed multiple failed privileged logins from the same subnet. Which signs should the threat hunter look for to confirm and mitigate the threat?

Options:

A.

Network-based artifacts

B.

Threat intelligence and adversary context

C.

Host-based artifacts

D.

Indicators of Attack (IoAs)

Question 24

Which of the following data source will a SOC Analyst use to monitor connections to the insecure ports?

Options:

A.

Netstat Data

B.

DNS Data

C.

IIS Data

D.

DHCP Data

Page: 6 / 15
Total 200 questions