Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil 312-39 Online Access

Page: 12 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 45

Which attack works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

Options:

A.

Hybrid Attack

B.

Bruteforce Attack

C.

Rainbow Table Attack

D.

Birthday Attack

Question 46

Sarah, a financial analyst at a multinational corporation, is suspected of leaking sensitive financial data to an unauthorized external party. The SOC team observed anomalous data transfer patterns originating from her account, flagged by the SIEM, indicating potential data exfiltration. The incident response team must contain the incident swiftly to minimize data loss and protect critical assets. As a SOC analyst, which should be prioritized as the initial containment measure?

Options:

A.

Access control

B.

Change passwords regularly

C.

Isolate the storage

D.

Data-Centric Audit and Protection (DCAP)

Question 47

A company's SIEM is generating a high number of alerts, overwhelming the SOC team with false positives and irrelevant notifications. This reduces efficiency as analysts struggle to identify genuine incidents. To address this, the security team refines their approach by defining clear threat detection scenarios aligned with their environment and risk profile. This is expected to improve detection accuracy and streamline incident response. Which process is the team implementing?

Options:

A.

SIEM use case management

B.

IT compliance

C.

Security analytics

D.

Log forensics

Question 48

An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company’s URL as follows:

<script>alert("WARNING: The application has encountered an error");</script>. Identify the attack demonstrated in the above scenario.

Options:

A.

Cross-site Scripting Attack

B.

SQL Injection Attack

C.

Denial-of-Service Attack

D.

Session Attack

Page: 12 / 15
Total 200 questions