Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil CSA 312-39 Questions and answers with Dumpstech

Exam 312-39 Premium Access

View all detail and faqs for the 312-39 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

A rapidly growing e-commerce company wants to implement a SIEM solution to improve its security posture and comply with PCI DSS requirements. They need a solution that offers both the necessary technological features and the expertise to manage the system effectively. They also need continuous compliance support and data security assistance. Which SIEM solution is appropriate for this company?

Options:

A.

Cloud-based SIEM

B.

In-house SIEM

C.

Managed SIEM

D.

Security analytics

Questions # 52:

The SOC analyst at a national cybersecurity agency detected unusual system behavior on critical infrastructure servers. Initial scans flagged potential malware activity. Due to the sophisticated nature of the suspected attack, including registry modifications, process injection, and unauthorized tasks, the case was escalated to the forensic team. The forensic team suspects the malware is designed for stealthy data exfiltration. To assess the compromise, they captured system snapshots before and after suspected infection to identify unauthorized changes and anomalies. Which process are they following by capturing and comparing system snapshots to detect unauthorized changes?

Options:

A.

Digital forensics

B.

Signature-based detection

C.

Threat intelligence gathering

D.

Host integrity monitoring

Questions # 53:

At 9:15 AM EST, Marcus Wong, a financial operations analyst, contacts the SOC after noticing Excel spreadsheets automatically encrypting with unusual file extensions (e.g., .locked or .crypt). The Tier 1 analyst logs the incident as ticket #INC-89271 in the SIEM and escalates it to a Tier 2 SOC analyst for investigation. Which phase of the Incident Response process is currently taking place?

Options:

A.

Containment

B.

Incident triage

C.

Incident recording and assignment

D.

Notification

Questions # 54:

A mid-sized hospital's SOC team has recently detected multiple malware incidents that disrupted access to patient records and caused operational inefficiencies. The SOC analysts have been tasked with eradicating current infections and preventing future attacks by addressing the underlying vulnerabilities that allowed the malware to breach defenses. As a SOC analyst, you need to recommend a step that directly targets weaknesses in the hospital’s network infrastructure or system configurations exploited by the malware. Which eradication step would best address these root causes?

Options:

A.

Fixing devices

B.

Using antivirus tools for quarantine

C.

Updating the malware database with vendor signatures

D.

Implementing blacklist techniques for file execution

Questions # 55:

A mid-sized healthcare organization is facing frequent phishing and ransomware attacks. They lack an internal SOC and want proactive threat detection and response capabilities. Compliance with HIPAA regulations is essential. The organization seeks a solution that includes both monitoring and rapid response to incidents. Which service best meets their needs?

Options:

A.

MSSP with 24/7 log monitoring and incident escalation

B.

Self-hosted SIEM with in-house SOC analysts

C.

MDR with proactive threat hunting and incident containment

D.

Cloud-based SIEM with MSSP-managed services

Questions # 56:

Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.

Options:

A.

DoS Attack

B.

Man-In-Middle Attack

C.

Ransomware Attack

D.

Reconnaissance Attack

Questions # 57:

Jackson & Co., a mid-sized law firm, is concerned about web-based cyber threats. The IT team implements a solution that serves as an intermediary for all HTTP and HTTPS requests. This allows the SOC to inspect, filter, and control web traffic to detect and block malicious websites, phishing attempts, and other online threats before they reach users. Which containment method is the organization using to gain visibility and control over web traffic?

Options:

A.

Whitelisting

B.

Blacklisting

C.

Web content filtering

D.

Proxy servers

Questions # 58:

A SOC analyst monitoring authentication logs detects a sudden and significant spike in failed login attempts targeting multiple critical servers during non-business hours. These repeated authentication failures are abnormal compared to typical login activity. All attempts originate from a single external IP address, indicating a targeted attack rather than random scanning. Some login attempts use legitimate employee usernames, suggesting credential stuffing using previously compromised credentials or an ongoing brute-force attempt. Given this suspicious activity and its potential to escalate into unauthorized access, what is the appropriate next step in the threat-hunting process to assess the situation further?

Options:

A.

Rapid response

B.

Continuous improvement

C.

Establish a baseline

D.

Investigate and analyze

Questions # 59:

Which of the following framework describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering?

Options:

A.

COBIT

B.

ITIL

C.

SSE-CMM

D.

SOC-CMM

Questions # 60:

Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords and their corresponding hash values to crack the password.

Options:

A.

Dictionary Attack

B.

Rainbow Table Attack

C.

Bruteforce Attack

D.

Syllable Attack

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions