Certification Provider: EC-Council
Exam Name: Certified SOC Analyst (CSA)
Exam Code: 312-39
Official Exam Time: 180 mins
Number of questions in the Official Exam: 100 Q&As
Latest update time in our database: May 30,2023
312-39 Official Exam Topics:
  • Topic1 : Discuss the Components of SOC: People, Processes and Technology
  • Topic2 : Understanding Cyber Threats, IoCs, and Attack Methodology / Describe the term Cyber Threats and Attacks
  • Topic3 : Understand the Network Level Attacks / Understand the Host Level Attacks
  • Topic4 : Understand the Application Level Attacks / Discuss the Attacker’s Hacking Methodology
  • Topic5 : Incidents, Events, and Logging / Understand the Fundamentals of Incidents, Events, and Logging
  • Topic6 : Explain the Concepts of Local Logging / Explain the Concepts of Centralized Logging
  • Topic7 : Incident Detection with Security Information and Event Management (SIEM) / Understand the SIEM Deployment
  • Topic8 : Learn Different Use Case Examples for Application Level Incident Detection / Learn Different Use Case Examples for Insider Incident Detection
  • Topic9 : Learn Different Use Case Examples for Host Level Incident Detection / Learn Different Use Case Examples for Compliance
  • Topic10 : Learn Fundamental Concepts on Threat Intelligence / Understand How Threat Intelligence Strategy is Developed
  • Topic11 : Learn Different Threat Intelligence Sources from which Intelligence can be Obtained / Learn Various Phases in Incident Response Process
  • Topic12 : Learn How to Respond to Email Security Incidents / Learn How to Respond to Insider Incidents
  • Topic13 : Learn How to Respond to Malware Incidents /

Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?
A . Analytical Threat Intelligence
B . Operational Threat Intelligence
C . Strategic Threat Intelligence
D . Tactical Threat Intelligence

Answer: D

Explanation:

Reference: https://info-savvy.com/types-of-threat-intelligence/

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
A . SystemDrive%inetpublogsLogFilesW3SVCN
B . SystemDrive%LogFilesinetpublogsW3SVCN
C . %SystemDrive%LogFileslogsW3SVCN
D . SystemDrive% inetpubLogFileslogsW3SVCN

Answer: A

What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?

Bonney’s system has been compromised by a gruesome malware.

What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
A . Complaint to police in a formal way regarding the incident
B . Turn off the infected machine
C . Leave it to the network administrators to handle
D . Call the legal department in the organization and inform about the incident

Answer: B

What does these TTPs refer to?

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs.

What does these TTPs refer to?
A . Tactics, Techniques, and Procedures
B . Tactics, Threats, and Procedures
C . Targets, Threats, and Process
D . Tactics, Targets, and Process

Answer: A

Explanation:

Reference: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intelligence.pdf

What filter should Peter add to the ‘show logging’ command to get the required output?

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the ‘show logging’ command to get the required output?
A . show logging | access 210
B . show logging | forward 210
C . show logging | include 210
D . show logging | route 210

Answer: C