Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?

Options:

A.

Create a Chain of Custody Document


B.

Send it to the nearby police station


C.

Set a Forensic lab


D.

CallOrganizational Disciplinary Team


Expert Solution
Questions # 42:

In a large corporation, the HR department receives an urgent email from someone impersonating a high-level executive, requesting immediate transfer of sensitive employee data. The email includes an official-looking document and a phone number for verification. Feeling pressured, the HR manager calls the number and “confirms” the request, then transfers the data. Investigation later confirms the email was fraudulent and the executive had no knowledge of the request. What type of attack did the HR department face?

Options:

A.

Credential theft


B.

Web-based intrusion


C.

Social engineering attack


D.

Application exploit


Expert Solution
Questions # 43:

A government agency needs to monitor its network for unusual data exfiltration attempts. Traditional log data is insufficient to identify traffic anomalies, so the SIEM team integrates traffic flow data to detect large transfers and unexpected spikes. The team must choose the appropriate protocol to collect IP traffic information from routers and switches. Which protocol should be used?

Options:

A.

SNMP (Simple Network Management Protocol)


B.

NetFlow (RFC 3954)


C.

Syslog


D.

IPFIX (IP Flow Information Export)


Expert Solution
Questions # 44:

Identify the HTTP status codes that represents the server error.

Options:

A.

2XX


B.

4XX


C.

1XX


D.

5XX


Expert Solution
Questions # 45:

Charline is working as an L2 SOC Analyst. One day, an L1 SOC Analyst escalated an incident to her for furtherinvestigation and confirmation. Charline, after a thorough investigation, confirmed the incident and assigned it with an initial priority.

What would be her next action according to the SOC workflow?

Options:

A.

She should immediately escalate this issue to the management


B.

She should immediately contact the network administrator to solve the problem


C.

She should communicate this incident to the media immediately


D.

She should formally raise a ticket and forward it to the IRT


Expert Solution
Questions # 46:

What is the correct sequence of SOC Workflow?

Options:

A.

Collect, Ingest, Validate, Document, Report, Respond


B.

Collect, Ingest, Document, Validate, Report, Respond


C.

Collect, Respond, Validate, Ingest, Report,Document


D.

Collect, Ingest, Validate, Report, Respond, Document


Expert Solution
Questions # 47:

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs.

What does these TTPs refer to?

Options:

A.

Tactics, Techniques, and Procedures


B.

Tactics, Threats, and Procedures


C.

Targets, Threats, and Process


D.

Tactics, Targets, and Process


Expert Solution
Questions # 48:

An attacker attempts to gain unauthorized access to a secure network by repeatedly guessing login credentials. The SIEM is configured to generate an alert after detecting 10 consecutive failed login attempts within a short timeframe. However, the attacker successfully logs in on the 9th attempt, just before the threshold is reached, bypassing the alert mechanism. The security team only becomes aware of the incident after detecting suspicious activity post-login, highlighting a gap in the SIEM’s detection rules. What type of alert classification does this represent?

Options:

A.

False negative


B.

False positive


C.

True negative


D.

True positive


Expert Solution
Questions # 49:

During a threat intelligence briefing, a SOC analyst comes across a classified report detailing a sophisticated cybercrime syndicate targeting executives of high-profile financial institutions. These adversaries rarely leave digital footprints and seem to anticipate security measures. Several breaches began with seemingly innocent conversations: a foreign journalist requesting an interview with a CEO and a “security consultant” offering free risk assessments. Further investigation reveals attackers socially engineered employees, manipulated trust, and extracted critical security details long before launching technical attacks. The analyst decides to focus on intelligence involving deception detection and psychological profiling to uncover true intent and methods. Which type of intelligence is the analyst leveraging?

Options:

A.

Human Intelligence


B.

Threat Intelligence Feeds


C.

Open-Source Intelligence (OSINT)


D.

Technical Threat Intelligence


Expert Solution
Questions # 50:

A financial institution's SIEM is generating a high number of false positives, causing alert fatigue among SOC analysts. To reduce this burden and improve threat detection accuracy, the organization integrates AI capabilities into the SIEM. After implementation, the SOC team observes a significant decrease in redundant alerts, along with faster detection of genuine threats. Which AI capability contributed to this improvement?

Options:

A.

Dynamic rule optimization


B.

Rule validation and testing


C.

Automated rule generation


D.

Data integration enhancement


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions