Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil CSA 312-39 Questions and answers with Dumpstech

Exam 312-39 Premium Access

View all detail and faqs for the 312-39 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

You are a SOC analyst on duty during a high-severity incident involving a DDoS attack targeting your organization’s e-commerce platform. The attack disrupts online transactions. Using SIEM tools and packet capture systems, you identify unusual traffic patterns and trace activity back to command-and-control (C2) servers directing a botnet. Your goal is to recommend an eradication strategy that will sever the attackers’ control over infected devices and halt the attack. Which strategy should your team implement?

Options:

A.

Rate limiting

B.

Neutralizing handlers

C.

Blocking potential attacks

D.

Disabling botnets

Questions # 32:

Mark Reynolds, a SOC analyst at a global financial institution, is working on the eradication phase after detecting phishing attacks targeting employees. To ensure attackers cannot reuse malicious infrastructure, Mark implements a technique that blocks known malicious IP addresses used for sending spam emails at the Domain Name System (DNS) level. Which technique is best suited?

Options:

A.

URL blacklisting on web proxies

B.

IP address blacklisting at the firewall

C.

DNS blackholing

D.

SMTP server filtering

Questions # 33:

A security team is designing SIEM use-case logic to detect privilege escalation attempts on Windows servers. They have already identified and validated the necessary event sources (e.g., Active Directory logs, Windows Security logs). What should be their next step in the use case logic development process?

Options:

A.

Define response actions for detected incidents before writing the rules

B.

Define correlation rules and conditions that detect specific privilege escalation patterns

C.

Implement and test the use case immediately in the production SIEM environment

D.

Collect historical security logs to confirm the use case is necessary

Questions # 34:

At GlobalTech, the SOC team detects a suspicious ransomware outbreak affecting multiple endpoints. After successfully isolating the infected systems from the network, the Digital Forensics team begins their investigation. They deploy a forensics workstation to acquire RAM dumps, extract Windows Event Logs, and collect network PCAP files from the compromised hosts. Which phase of the Incident Response lifecycle is currently underway?

Options:

A.

Recovery

B.

Evidence gathering and forensic analysis

C.

Containment

D.

Eradication

Questions # 35:

Sarah Chen works as a security analyst at Midwest Financial. At 2:00 AM, the SOC detects unusual data exfiltration patterns and evidence of lateral movement across multiple servers containing sensitive customer data. The activity appears sophisticated and may require forensic analysis and system restoration. Which team should take primary responsibility for managing this complex security incident?

Options:

A.

Threat intelligence team

B.

Incident response team (IRT)

C.

Security engineering team

D.

SOC team

Questions # 36:

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?

Options:

A.

Create a Chain of Custody Document

B.

Send it to the nearby police station

C.

Set a Forensic lab

D.

CallOrganizational Disciplinary Team

Questions # 37:

Which of the following attack can be eradicated by converting all non-alphanumeric characters to HTML character entities before displaying the user input in search engines and forums?

Options:

A.

Broken Access Control Attacks

B.

WebServices Attacks

C.

XSS Attacks

D.

Session Management Attacks

Questions # 38:

Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?

Options:

A.

Rule-based detection

B.

Heuristic-based detection

C.

Anomaly-based detection

D.

Signature-based detection

Questions # 39:

Which of the following threat intelligence helps cyber securityprofessionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Options:

A.

Analytical Threat Intelligence

B.

Operational Threat Intelligence

C.

Strategic Threat Intelligence

D.

Tactical Threat Intelligence

Questions # 40:

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.

Identify the stage in which he is currently in.

Options:

A.

Post-Incident Activities

B.

Incident Recording and Assignment

C.

Incident Triage

D.

Incident Disclosure

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions