Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-39 Exam Dumps - ECCouncil CSA Questions and Answers

Question # 24

Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?

Options:

A.

FISMA

B.

HIPAA

C.

PCI-DSS

D.

DARPA

Buy Now
Question # 25

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the 'show logging' command to get the required output?

Options:

A.

show logging | access 210

B.

show logging | forward 210

C.

show logging | include 210

D.

show logging | route 210

Buy Now
Question # 26

Which of the following technique involves scanning the headers of IP packets leaving a network to make sure

that the unauthorized or malicious traffic never leaves the internal network?

Options:

A.

Egress Filtering

B.

Throttling

C.

Rate Limiting

D.

Ingress Filtering

Buy Now
Question # 27

Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?

Options:

A.

threat_note

B.

MagicTree

C.

IntelMQ

D.

Malstrom

Buy Now
Question # 28

Identify the attack in which the attacker exploits a target system through publicly known but still unpatched vulnerabilities.

Options:

A.

Slow DoS Attack

B.

DHCP Starvation

C.

Zero-Day Attack

D.

DNS Poisoning Attack

Buy Now
Question # 29

Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks.

What among the following should Wesley avoid from considering?

Options:

A.

Deserialization of trusted data must cross a trust boundary

B.

Understand the security permissions given to serialization and deserialization

C.

Allow serialization for security-sensitive classes

D.

Validate untrusted input, which is to be serialized to ensure that serialized data contain only trusted classes

Buy Now
Question # 30

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

Options:

A.

SystemDrive%\inetpub\logs\LogFiles\W3SVCN

B.

SystemDrive%\LogFiles\inetpub\logs\W3SVCN

C.

%SystemDrive%\LogFiles\logs\W3SVCN

D.

SystemDrive%\ inetpub\LogFiles\logs\W3SVCN

Buy Now
Question # 31

Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.

What does this event log indicate?

Options:

A.

SQL Injection Attack

B.

Parameter Tampering Attack

C.

XSS Attack

D.

Directory Traversal Attack

Buy Now
Question # 32

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?

NOTE: It is mandatory to answer the question before proceeding to the next one.

Options:

A.

High

B.

Extreme

C.

Low

D.

Medium

Buy Now
Question # 33

Which of the following data source will a SOC Analyst use to monitor connections to the insecure ports?

Options:

A.

Netstat Data

B.

DNS Data

C.

IIS Data

D.

DHCP Data

Buy Now
Exam Code: 312-39
Exam Name: Certified SOC Analyst (CSA)
Last Update: Jan 31, 2025
Questions: 100
312-39 pdf

312-39 PDF

$25.5  $84.99
312-39 Engine

312-39 Testing Engine

$28.5  $94.99
312-39 PDF + Engine

312-39 PDF + Testing Engine

$40.5  $134.99