312-39 Certified SOC Analyst (CSA) exam is a hot EC-Council certification exam, Exam4Training offers you the latest free online 312-39 dumps to practice. You can get online training in the following questions, all these questions are verified by EC-Council experts. If this exam changed, we will share new update questions.
Certification Provider: EC-Council Exam Name: Certified SOC Analyst (CSA) Exam Code: 312-39 Official Exam Time: 180 mins Number of questions in the Official Exam: 100 Q&As Latest update time in our database: May 30,2023 312-39 Official Exam Topics:
Topic1 : Discuss the Components of SOC: People, Processes and Technology
Topic2 : Understanding Cyber Threats, IoCs, and Attack Methodology / Describe the term Cyber Threats and Attacks
Topic3 : Understand the Network Level Attacks / Understand the Host Level Attacks
Topic4 : Understand the Application Level Attacks / Discuss the Attacker’s Hacking Methodology
Topic5 : Incidents, Events, and Logging / Understand the Fundamentals of Incidents, Events, and Logging
Topic6 : Explain the Concepts of Local Logging / Explain the Concepts of Centralized Logging
Topic7 : Incident Detection with Security Information and Event Management (SIEM) / Understand the SIEM Deployment
Topic8 : Learn Different Use Case Examples for Application Level Incident Detection / Learn Different Use Case Examples for Insider Incident Detection
Topic9 : Learn Different Use Case Examples for Host Level Incident Detection / Learn Different Use Case Examples for Compliance
Topic10 : Learn Fundamental Concepts on Threat Intelligence / Understand How Threat Intelligence Strategy is Developed
Topic11 : Learn Different Threat Intelligence Sources from which Intelligence can be Obtained / Learn Various Phases in Incident Response Process
Topic12 : Learn How to Respond to Email Security Incidents / Learn How to Respond to Insider Incidents
Topic13 : Learn How to Respond to Malware Incidents /
Which of the following command is used to view iptables logs on Ubuntu and Debian distributions? A . $ tailf /var/log/sys/kern.log B . $ tailf /var/log/kern.log C . # tailf /var/log/messages D . # tailf /var/log/sys/messages
Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors? A . Analytical Threat Intelligence B . Operational Threat Intelligence C . Strategic Threat Intelligence D . Tactical Threat Intelligence
Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.
Where will Harley find the web server logs, if he wants to investigate them for any anomalies? A . SystemDrive%inetpublogsLogFilesW3SVCN B . SystemDrive%LogFilesinetpublogsW3SVCN C . %SystemDrive%LogFileslogsW3SVCN D . SystemDrive% inetpubLogFileslogsW3SVCN
Bonney’s system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading? A . Complaint to police in a formal way regarding the incident B . Turn off the infected machine C . Leave it to the network administrators to handle D . Call the legal department in the organization and inform about the incident
Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs.
What does these TTPs refer to? A . Tactics, Techniques, and Procedures B . Tactics, Threats, and Procedures C . Targets, Threats, and Process D . Tactics, Targets, and Process
Which of the following fields in Windows logs defines the type of event occurred, such as Correlation Hint, Response Time, SQM, WDI Context, and so on? A . Keywords B . Task Category C . Level D . Source
Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process? A . threat_note B . MagicTree C . IntelMQ D . Malstrom
Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.
What filter should Peter add to the ‘show logging’ command to get the required output? A . show logging | access 210 B . show logging | forward 210 C . show logging | include 210 D . show logging | route 210