Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the ECCouncil CSA 312-39 Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

Following a high-priority security incident, you, as an Incident Responder at a Cyber Incident Response firm, initiate an internal investigation after reports confirm a serious data breach in which sensitive customer data, including payment details and personal information, was stolen from a critical web server. You begin analyzing the server logs to reconstruct the attack timeline and identify how the attacker gained access. During your investigation, you discover suspicious activity in the logs, including repeated requests attempting to access files and directories outside of the web server’s root directory. Some of these requests appear to be manipulating URL paths to navigate into restricted system files—a behavior that is often associated with web-based exploits. You suspect that a vulnerability in the web server was exploited to bypass security restrictions and access unauthorized directories, potentially exposing sensitive configurations and credentials. However, you still need to confirm the exact technique used. Which type of web application attack might have caused this incident?

Options:

A.

Cross-Site Scripting (XSS) Attacks


B.

Directory Traversal


C.

SQL Injection Attack


D.

Session Attacks: Cookie Poisoning


Expert Solution
Questions # 52:

One week after a ransomware attack disrupted operations, Sarah, a SOC analyst, leads a review meeting with the IT team, security engineers, and business unit representatives. The group reviews the incident timeline, calculates a business impact of $157,000 due to downtime and data loss, and identifies seven critical improvements to enhance detection and response processes. Which of the following Incident Response phase is this?

Options:

A.

Recovery


B.

Post-Incident Activities


C.

Eradication


D.

Containment


Expert Solution
Questions # 53:

At a large healthcare organization, the Security Operations Center (SOC) detects a surge of failed login attempts on employee accounts, indicating a possible brute-force attack. To contain the threat, the team quickly takes action to prevent unauthorized access. However, they also need to implement a security measure that strengthens account protection beyond just stopping the current attack, reducing the risk of similar incidents in the future. During the Containment Phase, which action would best enhance long-term account security against brute-force attacks?

Options:

A.

Notify affected users


B.

Block IP addresses and enforce account lockout policies


C.

Cross-verify false positives


D.

Enable multi-factor authentication (MFA)


Expert Solution
Questions # 54:

John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare adashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.

Which of the following data source will he use to prepare the dashboard?

Options:

A.

DHCP/Logs capable of maintaining IP addresses or hostnames withIPtoName resolution.


B.

IIS/Web Server logs with IP addresses and user agent IPtouseragent resolution.


C.

DNS/ Web Server logs with IP addresses.


D.

Apache/ Web Server logs with IP addresses and Host Name.


Expert Solution
Questions # 55:

Bonney's system has been compromised by a gruesome malware.

What is the primary step that is advisable to Bonney in order to contain the malware incident fromspreading?

Options:

A.

Complaint to police in a formal way regarding the incident


B.

Turn off the infected machine


C.

Leave it to the network administrators to handle


D.

Call the legal department in the organization and inform about the incident


Expert Solution
Questions # 56:

Lisa Carter, a SOC analyst at a financial services firm, is performing a risk assessment following suspicious alerts detected by the SIEM. She evaluates three key factors: the likelihood of an attack succeeding based on current threat intelligence, the impact on critical business operations if the breach occurs, and the value of the assets targeted (e.g., customer data, financial systems). Using the standard risk assessment approach, which scenario represents the highest risk to the organization?

Options:

A.

High Likelihood, High Impact, High Asset Value


B.

Low Likelihood, High Impact, Low Asset Value


C.

Low Likelihood, Low Impact, High Asset Value


D.

High Likelihood, Low Impact, High Asset Value


Expert Solution
Questions # 57:

Pearl is a Level 1 SOC analyst at a global financial institution using SQL Server to store sensitive customer information. She investigates an alert showing multiple failed web app logins from the same IP, followed by a successful login as a server administrator. She then reviews SQL Server logs and finds the attacker used compromised credentials to access the SQL Server database. Which log will help identify whether the intruder performed unauthorized modifications in the database?

Options:

A.

Transaction log


B.

Security log


C.

Maintenance log


D.

Audit log


Expert Solution
Questions # 58:

Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.

Options:

A.

DoS Attack


B.

Man-In-Middle Attack


C.

Ransomware Attack


D.

Reconnaissance Attack


Expert Solution
Questions # 59:

John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.

Which of the following types of threat intelligence did he use?

Options:

A.

Strategic Threat Intelligence


B.

Technical ThreatIntelligence


C.

Tactical Threat Intelligence


D.

Operational Threat Intelligence


Expert Solution
Questions # 60:

A large financial institution receives thousands of security logs daily from firewalls, IDS systems, and user authentication platforms. The SOC uses an AI-driven SIEM system with Natural Language Processing (NLP) capabilities to streamline threat detection. This enables faster response times, reduces manual rule creation, and helps detect advanced threats that traditional systems might overlook. Which option best illustrates the advantage of NLP in SIEM?

Options:

A.

Eliminates the need for data normalization and correlation in SIEM systems


B.

Allows security analysts to write SIEM rules using complex programming languages


C.

Simplifies infrastructure management by reducing hardware dependencies


D.

Enables analysis of text-based data from logs and communications to detect threats


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions