Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following factors determine the choice of SIEM architecture?

Options:

A.

SMTP Configuration


B.

DHCP Configuration


C.

DNS Configuration


D.

Network Topology


Expert Solution
Questions # 22:

Jason, a SOC Analyst with Maximus Tech, was investigating Cisco ASA Firewall logs and came across the following log entry:

May 06 2018 21:27:27 asa 1: %ASA -5 – 11008: User 'enable_15' executed the 'configure term' command What does the security level in the above log indicates?

Options:

A.

Warning condition message


B.

Critical condition message


C.

Normal but significant message


D.

Informational message


Expert Solution
Questions # 23:

A SOC analyst is responsible for designing a security dashboard that provides real-time monitoring of security threats. The organization wants to avoid overwhelming analysts with excessive information and focus on the most critical security alerts to ensure timely responses to potential threats. Which principle should guide the design of the dashboard?

Options:

A.

Include as much data as possible to ensure complete visibility


B.

Restrict dashboard access to only network administrators


C.

Prioritize critical information and remove unnecessary details


D.

Use only historical data to avoid real-time inconsistencies


Expert Solution
Questions # 24:

The SOC analyst at a national cybersecurity agency detected unusual system behavior on critical infrastructure servers. Initial scans flagged potential malware activity. Due to the sophisticated nature of the suspected attack, including registry modifications, process injection, and unauthorized tasks, the case was escalated to the forensic team. The forensic team suspects the malware is designed for stealthy data exfiltration. To assess the compromise, they captured system snapshots before and after suspected infection to identify unauthorized changes and anomalies. Which process are they following by capturing and comparing system snapshots to detect unauthorized changes?

Options:

A.

Digital forensics


B.

Signature-based detection


C.

Threat intelligence gathering


D.

Host integrity monitoring


Expert Solution
Questions # 25:

Which of the following attack can be eradicated by using a safe API to avoid the use of the interpreter entirely?

Options:

A.

CommandInjection Attacks


B.

SQL Injection Attacks


C.

File Injection Attacks


D.

LDAP Injection Attacks


Expert Solution
Questions # 26:

Which of the following service provides phishing protection and content filtering to manage the Internet experience on and off your network with the acceptable use or compliance policies?

Options:

A.

Apility.io


B.

Malstrom


C.

OpenDNS


D.

I-Blocklist


Expert Solution
Questions # 27:

The SOC team is investigating a phishing attack that targeted multiple employees. During the Containment Phase, they need to determine how users interacted with the malicious email: whether they opened it, clicked links, downloaded attachments, or entered credentials. This information is critical to assessing impact and preventing further compromise. Which specific activity helps the SOC team understand user interactions with the phishing email?

Options:

A.

Monitoring and containment validation


B.

Malware infection check


C.

User action verification


D.

Blocking command-and-control (C2) and email traffic


Expert Solution
Questions # 28:

During routine monitoring, the SIEM detects an unusual spike in outbound data transfer from a critical database server. The typical outbound traffic for this server is around 5 MB/hour, but in the past 10 minutes, it has sent over 500 MB to an external IP address. No predefined signatures match this activity, but the SIEM raises an alert due to deviations from the server’s normal behavior profile. Which detection method is responsible for this alert?

Options:

A.

Heuristic-based detection


B.

Signature-based detection


C.

Rule-based detection


D.

Anomaly-based detection


Expert Solution
Questions # 29:

Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.

What does thisindicate?

Options:

A.

Concurrent VPN Connections Attempt


B.

DNS Exfiltration Attempt


C.

Covering Tracks Attempt


D.

DHCP Starvation Attempt


Expert Solution
Questions # 30:

Jannet works in a multinational corporation that operates multiple data centers, cloud environments, and on-premises systems. As a SOC analyst, she notices that security incidents are taking too long to detect and investigate. After analyzing this, she discovers that logs from firewalls, endpoint security solutions, authentication servers, and cloud applications are scattered across different systems in various formats. Her team has to manually convert logs into a readable format before investigating incidents. What approach should she implement to accept logs from heterogeneous sources with different formats, convert them into a common format, and improve incident detection and response time?

Options:

A.

Log transformation


B.

Log normalization


C.

Log correlation


D.

Log collection


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions