Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CSA 312-39 Questions and answers with ValidTests

Exam 312-39 All Questions
Exam 312-39 Premium Access

View all detail and faqs for the 312-39 exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.

What does this event log indicate?

Options:

A.

XSS Attack

B.

SQL injection Attack

C.

Directory Traversal Attack

D.

Parameter Tampering Attack

Expert Solution
Questions # 2:

Which of the following technique involves scanning the headers of IP packets leaving a network to make sure

that the unauthorized or malicious traffic never leaves the internal network?

Options:

A.

Egress Filtering

B.

Throttling

C.

Rate Limiting

D.

Ingress Filtering

Expert Solution
Questions # 3:

Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?

Options:

A.

$ tailf /var/log/sys/kern.log

B.

$ tailf /var/log/kern.log

C.

# tailf /var/log/messages

D.

# tailf /var/log/sys/messages

Expert Solution
Questions # 4:

An organization wants to implement a SIEM deployment architecture. However, they have the capability to do only log collection and the rest of the SIEM functions must be managed by an MSSP.

Which SIEM deployment architecture will the organization adopt?

Options:

A.

Cloud, MSSP Managed

B.

Self-hosted, Jointly Managed

C.

Self-hosted, MSSP Managed

D.

Self-hosted, Self-Managed

Expert Solution
Questions # 5:

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

Options:

A.

De-Militarized Zone (DMZ)

B.

Firewall

C.

Honeypot

D.

Intrusion Detection System

Expert Solution
Questions # 6:

A type of threat intelligent that find out the information about the attacker by misleading them is known as

.

Options:

A.

Threat trending Intelligence

B.

Detection Threat Intelligence

C.

Operational Intelligence

D.

Counter Intelligence

Expert Solution
Questions # 7:

An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company’s URL as follows:

http://technosoft.com.com/ <script>alert("WARNING: The application has encountered an error");</script>. Identify the attack demonstrated in the above scenario.

Options:

A.

Cross-site Scripting Attack

B.

SQL Injection Attack

C.

Denial-of-Service Attack

D.

Session Attack

Expert Solution
Questions # 8:

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

Options:

A.

Nmap

B.

UrlScan

C.

ZAP proxy

D.

Hydra

Expert Solution
Questions # 9:

Identify the attack in which the attacker exploits a target system through publicly known but still unpatched vulnerabilities.

Options:

A.

Slow DoS Attack

B.

DHCP Starvation

C.

Zero-Day Attack

D.

DNS Poisoning Attack

Expert Solution
Questions # 10:

Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.

What does this indicate?

Options:

A.

Concurrent VPN Connections Attempt

B.

DNS Exfiltration Attempt

C.

Covering Tracks Attempt

D.

DHCP Starvation Attempt

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions