Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Legit 312-39 Exam Download

Page: 8 / 15
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 29

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.

Where will Harley find the web server logs, ifhe wants to investigate them for any anomalies?

Options:

A.

SystemDrive%\inetpub\logs\LogFiles\W3SVCN

B.

SystemDrive%\LogFiles\inetpub\logs\W3SVCN

C.

%SystemDrive%\LogFiles\logs\W3SVCN

D.

SystemDrive%\ inetpub\LogFiles\logs\W3SVCN

Question 30

Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?

Options:

A.

FISMA

B.

HIPAA

C.

PCI-DSS

D.

DARPA

Question 31

You are a SOC analyst on duty during a high-severity incident involving a DDoS attack targeting your organization’s e-commerce platform. The attack disrupts online transactions. Using SIEM tools and packet capture systems, you identify unusual traffic patterns and trace activity back to command-and-control (C2) servers directing a botnet. Your goal is to recommend an eradication strategy that will sever the attackers’ control over infected devices and halt the attack. Which strategy should your team implement?

Options:

A.

Rate limiting

B.

Neutralizing handlers

C.

Blocking potential attacks

D.

Disabling botnets

Question 32

A Security Operations Center (SOC) analyst receives a high-priority alert indicating unusual user activity. An employee account is attempting to access company resources from a different country and outside of their normal working hours. This behavior raises concerns about potential account compromise or unauthorized access. To automate the initial response and quickly restrict access while further investigating the incident, which SOAR playbook would be relevant to adapt and implement?

Options:

A.

Alert Enrichment SOAR Playbook

B.

Deprovisioning Users SOAR Playbook

C.

Malware Containment SOAR Playbook

D.

Phishing Investigations SOAR Playbook

Page: 8 / 15
Total 200 questions