Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 312-39 - Certified SOC Analyst (CSA)

Page: 3 / 3
Total 100 questions

Identify the HTTP status codes that represents the server error.

A.

2XX

B.

4XX

C.

1XX

D.

5XX

Which of the following Windows features is used to enable Security Auditing in Windows?

A.

Bitlocker

B.

Windows Firewall

C.

Local Group Policy Editor

D.

Windows Defender

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

A.

SystemDrive%\inetpub\logs\LogFiles\W3SVCN

B.

SystemDrive%\LogFiles\inetpub\logs\W3SVCN

C.

%SystemDrive%\LogFiles\logs\W3SVCN

D.

SystemDrive%\ inetpub\LogFiles\logs\W3SVCN

Jony, a security analyst, while monitoring IIS logs, identified events shown in the figure below.

What does this event log indicate?

A.

Parameter Tampering Attack

B.

XSS Attack

C.

Directory Traversal Attack

D.

SQL Injection Attack

Which of the following factors determine the choice of SIEM architecture?

A.

SMTP Configuration

B.

DHCP Configuration

C.

DNS Configuration

D.

Network Topology

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?

A.

Evidence Gathering

B.

Evidence Handling

C.

Eradication

D.

Systems Recovery

Which of the following Windows Event Id will help you monitors file sharing across the network?

A.

7045

B.

4625

C.

5140

D.

4624

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the 'show logging' command to get the required output?

A.

show logging | access 210

B.

show logging | forward 210

C.

show logging | include 210

D.

show logging | route 210

Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:

http://www.terabytes.com/process.php./../../../../etc/passwd

A.

Directory Traversal Attack

B.

SQL Injection Attack

C.

Denial-of-Service Attack

D.

Form Tampering Attack

What does Windows event ID 4740 indicate?

A.

A user account was locked out.

B.

A user account was disabled.

C.

A user account was enabled.

D.

A user account was created.