Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

Options:

A.

Unicode Encoding


B.

UTF Encoding


C.

Base64 Encoding


D.

URL Encoding


Expert Solution
Questions # 12:

Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?

Options:

A.

File Injection Attacks


B.

URL Injection Attacks


C.

LDAP Injection Attacks


D.

Command Injection Attacks


Expert Solution
Questions # 13:

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

Options:

A.

De-Militarized Zone (DMZ)


B.

Firewall


C.

Honeypot


D.

Intrusion Detection System


Expert Solution
Questions # 14:

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

Options:

A.

Ransomware Attack


B.

DoS Attack


C.

DHCP starvation Attack


D.

File Injection Attack


Expert Solution
Questions # 15:

Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?

Options:

A.

Rule-based detection


B.

Heuristic-based detection


C.

Anomaly-based detection


D.

Signature-based detection


Expert Solution
Questions # 16:

What does [-n] in the following checkpoint firewall log syntax represents?

fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]

Options:

A.

Speed up the process by not performing IP addresses DNS resolution in the Log files


B.

Display both the date and the time for each log record


C.

Display account log records only


D.

Display detailed log chains (all the log segments a log record consists of)


Expert Solution
Questions # 17:

Which of the following framework describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering?

Options:

A.

COBIT


B.

ITIL


C.

SSE-CMM


D.

SOC-CMM


Expert Solution
Questions # 18:

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.

Options:

A.

rule-based


B.

pull-based


C.

push-based


D.

signature-based


Expert Solution
Questions # 19:

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.

What is Ray and his team doing?

Options:

A.

Blocking the Attacks


B.

Diverting the Traffic


C.

Degrading the services


D.

Absorbing the Attack


Expert Solution
Questions # 20:

Which of the following are the responsibilities of SIEM Agents?

1.Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.

2.Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine.

3.Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.

4.Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.

Options:

A.

1 and 2


B.

2 and 3


C.

1 and 4


D.

3 and 1


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions