Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 312-39 - Certified SOC Analyst (CSA v2)

Page: 3 / 6
Total 200 questions

Mark Reynolds, a SOC analyst at a healthcare organization, is monitoring the SIEM system when he detects a potential security threat: a series of unusual login attempts targeting critical patient data servers. After investigating the alerts and collaborating with the incident response team, the SOC determines that the threat has a “Likely” chance of occurring and could cause “Significant” damage, including operational disruptions, financial loss due to data breaches, and regulatory penalties under HIPAA. Using a standard Risk Matrix, how would this risk be categorized in terms of overall severity?

A.

Medium

B.

Low

C.

High

D.

Very High

The SOC team at a national cybersecurity agency detects anomalous network traffic from a sensitive government server and escalates to forensics. The forensic team discovers a trojan suspected of data exfiltration and persistence. The lead malware analyst must determine capabilities and persistence mechanisms by analyzing the trojan’s binary code at the instruction level without executing it. Which technique should the analyst use?

A.

Malware disassembly

B.

Network behavior monitoring

C.

Dynamic code injection

D.

Interactive debugging

A SOC analyst monitors network traffic to detect potential data exfiltration. The team uses a security solution that inspects data packets in real time as they traverse the network. During incident response, the solution struggles to analyze encrypted traffic, limiting effectiveness in identifying threats hidden within secure communications. Which security control, with this known limitation, is the SOC team relying on?

A.

VPN

B.

Packet filters

C.

SSH

D.

IPsec

A multinational cybersecurity firm wants to enhance its threat intelligence capabilities by integrating real-time threat feeds into Microsoft Sentinel. These feeds include malicious IPs, domains, file hashes, and attack patterns. The firm requires a standardized protocol that allows automated threat intelligence sharing so Sentinel continuously receives updated indicators from external sources in a structured format. Which Microsoft Sentinel data connector should be implemented to integrate threat intelligence feeds using an industry-standard protocol?

A.

Threat Intelligence Platforms data connector

B.

Syslog connector

C.

TAXII data connector

D.

Microsoft Defender for Cloud (Legacy) connector

The SOC team is investigating a phishing attack that targeted multiple employees. During the Containment Phase, they need to determine how users interacted with the malicious email: whether they opened it, clicked links, downloaded attachments, or entered credentials. This information is critical to assessing impact and preventing further compromise. Which specific activity helps the SOC team understand user interactions with the phishing email?

A.

Monitoring and containment validation

B.

Malware infection check

C.

User action verification

D.

Blocking command-and-control (C2) and email traffic

A healthcare organization's SIEM detects unusual HTTP requests targeting its patient portal. The requests originate from a foreign IP address and occur during non-business hours. The methods used are primarily TRACE and OPTIONS, which are rarely seen in normal web traffic. The SIEM correlates these with increased reconnaissance activity on other servers within the same subnet. What is the primary security concern with TRACE and OPTIONS requests?

A.

They expose information about server-supported methods and request headers

B.

They can be used to upload malicious payloads directly to the server

C.

They make Distributed Denial of Service (DDoS) attacks easier

D.

They allow attackers to bypass authentication controls

In a large corporation, the HR department receives an urgent email from someone impersonating a high-level executive, requesting immediate transfer of sensitive employee data. The email includes an official-looking document and a phone number for verification. Feeling pressured, the HR manager calls the number and “confirms” the request, then transfers the data. Investigation later confirms the email was fraudulent and the executive had no knowledge of the request. What type of attack did the HR department face?

A.

Credential theft

B.

Web-based intrusion

C.

Social engineering attack

D.

Application exploit

What does the Security Log Event ID 4624 of Windows 10 indicate?

A.

Service added to the endpoint

B.

A share was assessed

C.

An account was successfully logged on

D.

New process executed

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?

A.

Evidence Gathering

B.

Evidence Handling

C.

Eradication

D.

SystemsRecovery

Which of the following is a report writing tool that will help incident handlers to generate efficientreports on detected incidents during incident response process?

A.

threat_note

B.

MagicTree

C.

IntelMQ

D.

Malstrom