Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

A SOC analyst detects multiple instances of powershell.exe being launched with the -ExecutionPolicy Bypass and -NoProfile arguments on a domain controller. The parent process is winrm.exe, and the activity occurs during non-business hours. What should be the analyst’s primary focus?

Options:

A.

Look for Event ID 4625 to check for failed authentication attempts before execution


B.

Investigate Event ID 7045 to determine if a malicious service was created


C.

Search for Event ID 4688 to find similar PowerShell executions within the last 24 hours


D.

Review Event ID 5145 to see if unauthorized network shares were accessed


Expert Solution
Questions # 12:

A multinational corporation with strict regulatory requirements (e.g., GDPR, PCI-DSS) needs a SIEM solution to monitor its global network. Data residency laws in certain regions prohibit transferring logs outside local jurisdictions. The company also requires centralized monitoring with 24/7 SOC operations but has limited in-house SIEM expertise. Which SIEM deployment model is appropriate?

Options:

A.

Self-hosted, jointly managed


B.

Hybrid model, jointly managed


C.

Self-hosted, MSSP-managed


D.

Cloud, MSSP-managed


Expert Solution
Questions # 13:

A large financial organization has experienced an increase in sophisticated cyber threats, including zero-day attacks and APTs. Traditional detection relies heavily on signatures and manual intervention, causing delays. The CISO is exploring AI-driven solutions that can automatically analyze large datasets, detect anomalies, and adapt to evolving threats in real time—identifying suspicious activity without predefined signatures and with minimal human oversight. Which key AI technology should the organization focus on?

Options:

A.

Static IP blocking


B.

Machine learning (ML)


C.

Natural language processing (NLP)


D.

Heuristic-based signature detection


Expert Solution
Questions # 14:

Rinni, SOC analyst, while monitoring IDS logs detected events shown in the figure below.

Question # 14

What does this event log indicate?

Options:

A.

Directory Traversal Attack


B.

XSS Attack


C.

SQL Injection Attack


D.

Parameter Tampering Attack


Expert Solution
Questions # 15:

Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?

Options:

A.

File Injection Attacks


B.

URL Injection Attacks


C.

LDAP Injection Attacks


D.

Command Injection Attacks


Expert Solution
Questions # 16:

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.

Identify the stage in which he is currently in.

Options:

A.

Post-Incident Activities


B.

Incident Recording and Assignment


C.

Incident Triage


D.

Incident Disclosure


Expert Solution
Questions # 17:

Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.

What does this event log indicate?

Options:

A.

SQL Injection Attack


B.

Parameter Tampering Attack


C.

XSS Attack


D.

Directory Traversal Attack


Expert Solution
Questions # 18:

CyberBank has experienced phishing, insider threats, and attempted data breaches targeting customer financial records. The bank operates across multiple regions and needs a solution offering continuous security monitoring, rapid threat detection, and centralized visibility across all branches. Which solution will provide automated alerting, digital forensics capabilities, and active threat hunting?

Options:

A.

Implementing SOAR (Security Orchestration, Automation, and Response)


B.

Implementing periodic security audits


C.

Implementing a Security Operations Center (SOC)


D.

Deploying a standalone SIEM (Security Information and Event Management) system


Expert Solution
Questions # 19:

Which of the following attack can be eradicated by filtering improper XML syntax?

Options:

A.

CAPTCHAAttacks


B.

SQL Injection Attacks


C.

Insufficient Logging and Monitoring Attacks


D.

Web Services Attacks


Expert Solution
Questions # 20:

Mark Reynolds, a SOC analyst at a global financial institution, is working on the eradication phase after detecting phishing attacks targeting employees. To ensure attackers cannot reuse malicious infrastructure, Mark implements a technique that blocks known malicious IP addresses used for sending spam emails at the Domain Name System (DNS) level. Which technique is best suited?

Options:

A.

URL blacklisting on web proxies


B.

IP address blacklisting at the firewall


C.

DNS blackholing


D.

SMTP server filtering


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions