Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the process of monitoring and capturing all data packets passing through a given network using different tools?

Options:

A.

Network Scanning


B.

DNS Footprinting


C.

Network Sniffing


D.

Port Scanning


Expert Solution
Questions # 2:

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very low and the impact of that attack is major?

Options:

A.

High


B.

Extreme


C.

Low


D.

Medium


Expert Solution
Questions # 3:

The Syslog message severity levels are labelled from level 0 to level 7.

What does level 0 indicate?

Options:

A.

Alert


B.

Notification


C.

Emergency


D.

Debugging


Expert Solution
Questions # 4:

Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Options:

A.

Analytical Threat Intelligence


B.

Operational Threat Intelligence


C.

Strategic Threat Intelligence


D.

Tactical Threat Intelligence


Expert Solution
Questions # 5:

What does the HTTP status codes 1XX represents?

Options:

A.

Informational message


B.

Client error


C.

Success


D.

Redirection


Expert Solution
Questions # 6:

Which of the following formula is used to calculate the EPS of the organization?

Options:

A.

EPS = average number of correlated events / time in seconds


B.

EPS = number of normalized events / time in seconds


C.

EPS = number of security events / time in seconds


D.

EPS = number of correlated events / time in seconds


Expert Solution
Questions # 7:

Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.

What does this event log indicate?

Options:

A.

Directory Traversal Attack


B.

Parameter Tampering Attack


C.

XSS Attack


D.

SQL Injection Attack


Expert Solution
Questions # 8:

Which of the following formula represents the risk?

Options:

A.

Risk = Likelihood × Severity × Asset Value


B.

Risk = Likelihood × Consequence × Severity


C.

Risk = Likelihood × Impact × Severity


D.

Risk = Likelihood × Impact × Asset Value


Expert Solution
Questions # 9:

Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.

What does this indicate?

Options:

A.

Concurrent VPN Connections Attempt


B.

DNS Exfiltration Attempt


C.

Covering Tracks Attempt


D.

DHCP Starvation Attempt


Expert Solution
Questions # 10:

Which of the following steps of incident handling and response process focus on limiting the scope and extent of an incident?

Options:

A.

Containment


B.

Data Collection


C.

Eradication


D.

Identification


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions