Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil CSA 312-39 Questions and answers with ValidTests

Exam 312-39 All Questions
Exam 312-39 Premium Access

View all detail and faqs for the 312-39 exam

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

You are a Threat Hunter at a law firm that suffered a data breach where confidential documents were leaked. Using the Cyber Kill Chain framework, you trace the attacker’s steps: they bypassed MFA by masquerading as a legitimate user, moved laterally, accessed sensitive records from a shared repository, and exfiltrated data over an extended period. You must identify the Cyber Kill Chain phase at which the attack was identified, to strengthen defenses and detect intrusions before exfiltration occurs. At which phase was the attack identified?

Options:

A.

Delivery

B.

Actions on objectives

C.

Command and control (C2)

D.

Exploitation

Questions # 32:

Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.

Options:

A.

Failure Audit

B.

Warning

C.

Error

D.

Information

Questions # 33:

SecureTech Inc. operates critical infrastructure and applications in AWS. The SOC detects suspicious activities such as unexpected API calls, unusual outbound traffic from instances, and DNS requests to potentially malicious domains. They need a fully managed AWS security service that continuously monitors for malicious activity, analyzes CloudTrail logs, VPC Flow Logs, and DNS query logs, leverages machine learning and threat intelligence, and provides actionable findings. Which AWS service best fits?

Options:

A.

Amazon Macie

B.

AWS Config

C.

AWS Security Hub

D.

Amazon GuardDuty

Questions # 34:

You are a Level 1 SOC analyst at a critical infrastructure provider. Threat actors infiltrated the network and exfiltrated sensitive system blueprints. Before detection, they executed commands that altered system logs, wiped forensic artifacts, and modified timestamps to mimic normal activity. They also manipulated security monitoring tools to prevent unusual login events from being recorded. Which APT lifecycle phase does this represent?

Options:

A.

Search and Exfiltration

B.

Initial Intrusion

C.

Cleanup

D.

Expansion

Questions # 35:

What does HTTPS Status code 403 represents?

Options:

A.

Unauthorized Error

B.

Not Found Error

C.

Internal Server Error

D.

Forbidden Error

Questions # 36:

Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?

Options:

A.

/etc/ossim/reputation

B.

/etc/ossim/siem/server/reputation/data

C.

/etc/siem/ossim/server/reputation.data

D.

/etc/ossim/server/reputation.data

Questions # 37:

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

Options:

A.

Nmap

B.

UrlScan

C.

ZAP proxy

D.

Hydra

Questions # 38:

A large financial services company has experienced increasing sophisticated threats targeting critical assets. The SOC primarily focuses on log collection and basic monitoring, but incidents revealed gaps in detecting and responding to advanced threats proactively. Management decides to adopt the SOC Capability Maturity Model (CMM). The initial assessment indicates the SOC is at Level 1, and the organization aims to reach Level 3 by enhancing incident response procedures, improving threat intelligence integration, establishing KPIs, automating triage, implementing behavior-based analytics, and creating continuous training. Based on the SOC CMM, what should be the first priority in transitioning from Level 1 to Level 3?

Options:

A.

Outsourcing SOC operations to an MSSP

B.

Deploying advanced deception technologies

C.

Establishing well-defined and repeatable incident response processes

D.

Implementing AI-driven automation for real-time detection and response

Questions # 39:

Which of the log storage method arranges event logs in the form of a circularbuffer?

Options:

A.

FIFO

B.

LIFO

C.

non-wrapping

D.

wrapping

Questions # 40:

Emmanuel is working as a SOC analyst in a company named Tobey Tech. The manager of Tobey Tech recently recruited an Incident Response Team (IRT) for his company. In the process of collaboration with the IRT, Emmanueljust escalated an incident to the IRT.

What is the first step that the IRT will do to the incident escalated by Emmanuel?

Options:

A.

Incident Analysis and Validation

B.

Incident Recording

C.

Incident Classification

D.

Incident Prioritization

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions