Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Jony, a security analyst, while monitoring IIS logs, identified events shown in the figure below.

Question # 21

What does this event log indicate?

Options:

A.

Parameter Tampering Attack


B.

XSS Attack


C.

Directory Traversal Attack


D.

SQL Injection Attack


Expert Solution
Questions # 22:

What does the Security Log Event ID 4624 of Windows 10 indicate?

Options:

A.

Service added to the endpoint


B.

A share was assessed


C.

An account was successfully logged on


D.

New process executed


Expert Solution
Questions # 23:

Bonney's system has been compromised by a gruesome malware.

What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?

Options:

A.

Complaint to police in a formal way regarding the incident


B.

Turn off the infected machine


C.

Leave it to the network administrators to handle


D.

Call the legal department in the organization and inform about the incident


Expert Solution
Questions # 24:

Which of the following directory will contain logs related to printer access?

Options:

A.

/var/log/cups/Printer_log file


B.

/var/log/cups/access_log file


C.

/var/log/cups/accesslog file


D.

/var/log/cups/Printeraccess_log file


Expert Solution
Questions # 25:

John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.

Which of the following data source will he use to prepare the dashboard?

Options:

A.

DHCP/Logs capable of maintaining IP addresses or hostnames with IPtoName resolution.


B.

IIS/Web Server logs with IP addresses and user agent IPtouseragent resolution.


C.

DNS/ Web Server logs with IP addresses.


D.

Apache/ Web Server logs with IP addresses and Host Name.


Expert Solution
Questions # 26:

Which of the following is a correct flow of the stages in an incident handling and response (IH&R) process?

Options:

A.

Containment –> Incident Recording –> Incident Triage –> Preparation –> Recovery –> Eradication –> Post-Incident Activities


B.

Preparation –> Incident Recording –> Incident Triage –> Containment –> Eradication –> Recovery –> Post-Incident Activities


C.

Incident Triage –> Eradication –> Containment –> Incident Recording –> Preparation –> Recovery –> Post-Incident Activities


D.

Incident Recording –> Preparation –> Containment –> Incident Triage –> Recovery –> Eradication –> Post-Incident Activities


Expert Solution
Questions # 27:

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the 'show logging' command to get the required output?

Options:

A.

show logging | access 210


B.

show logging | forward 210


C.

show logging | include 210


D.

show logging | route 210


Expert Solution
Questions # 28:

Which of the following attack can be eradicated by filtering improper XML syntax?

Options:

A.

CAPTCHA Attacks


B.

SQL Injection Attacks


C.

Insufficient Logging and Monitoring Attacks


D.

Web Services Attacks


Expert Solution
Questions # 29:

Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.

Options:

A.

DoS Attack


B.

Man-In-Middle Attack


C.

Ransomware Attack


D.

Reconnaissance Attack


Expert Solution
Questions # 30:

Robin, a SOC engineer in a multinational company, is planning to implement a SIEM. He realized that his organization is capable of performing only Correlation, Analytics, Reporting, Retention, Alerting, and Visualization required for the SIEM implementation and has to take collection and aggregation services from a Managed Security Services Provider (MSSP).

What kind of SIEM is Robin planning to implement?

Options:

A.

Self-hosted, Self-Managed


B.

Self-hosted, MSSP Managed


C.

Hybrid Model, Jointly Managed


D.

Cloud, Self-Managed


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions