Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 312-39 - Certified SOC Analyst (CSA v2)

Page: 1 / 6
Total 200 questions

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

A.

Nmap

B.

UrlScan

C.

ZAP proxy

D.

Hydra

Jennifer, a SOC analyst, initiates an investigation after receiving an alert about potential unauthorized activity on Marcus's workstation. She starts by retrieving EDR logs from the endpoint, analyzing network traffic patterns in the Security Information and Event Management (SIEM) system, and inspecting email gateway logs for signs of malicious attachments. Her objective is to determine whether this alert represents a legitimate security incident. In which phase of the Incident Response process is Jennifer currently operating?

A.

Incident Triage

B.

Evidence Gathering and Forensic Analysis

C.

Notification

D.

Incident Recording and Assignment

Sarah, a financial analyst at a multinational corporation, is suspected of leaking sensitive financial data to an unauthorized external party. The SOC team observed anomalous data transfer patterns originating from her account, flagged by the SIEM, indicating potential data exfiltration. The incident response team must contain the incident swiftly to minimize data loss and protect critical assets. As a SOC analyst, which should be prioritized as the initial containment measure?

A.

Access control

B.

Change passwords regularly

C.

Isolate the storage

D.

Data-Centric Audit and Protection (DCAP)

Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.

A.

Failure Audit

B.

Warning

C.

Error

D.

Information

Following a high-priority security incident, you, as an Incident Responder at a Cyber Incident Response firm, initiate an internal investigation after reports confirm a serious data breach in which sensitive customer data, including payment details and personal information, was stolen from a critical web server. You begin analyzing the server logs to reconstruct the attack timeline and identify how the attacker gained access. During your investigation, you discover suspicious activity in the logs, including repeated requests attempting to access files and directories outside of the web server’s root directory. Some of these requests appear to be manipulating URL paths to navigate into restricted system files—a behavior that is often associated with web-based exploits. You suspect that a vulnerability in the web server was exploited to bypass security restrictions and access unauthorized directories, potentially exposing sensitive configurations and credentials. However, you still need to confirm the exact technique used. Which type of web application attack might have caused this incident?

A.

Cross-Site Scripting (XSS) Attacks

B.

Directory Traversal

C.

SQL Injection Attack

D.

Session Attacks: Cookie Poisoning

Which of the following directory will contain logs related to printer access?

A.

/var/log/cups/Printer_log file

B.

/var/log/cups/access_log file

C.

/var/log/cups/accesslog file

D.

/var/log/cups/Printeraccess_log file

Identify the HTTP status codes that represents the server error.

A.

2XX

B.

4XX

C.

1XX

D.

5XX

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?

NOTE: It is mandatory to answer the question before proceeding to the next one.

A.

High

B.

Extreme

C.

Low

D.

Medium

An attacker attempts to gain unauthorized access to a secure network by repeatedly guessing login credentials. The SIEM is configured to generate an alert after detecting 10 consecutive failed login attempts within a short timeframe. However, the attacker successfully logs in on the 9th attempt, just before the threshold is reached, bypassing the alert mechanism. The security team only becomes aware of the incident after detecting suspicious activity post-login, highlighting a gap in the SIEM’s detection rules. What type of alert classification does this represent?

A.

False negative

B.

False positive

C.

True negative

D.

True positive

The SOC team is tasked with enhancing the security of an organization's network infrastructure. The organization's public-facing web servers, which handle customer transactions, need to be isolated from the internal private network containing sensitive employee data and proprietary systems. The goal is to create a buffer zone that limits exposure of internal systems if the web servers are compromised during a cyberattack, such as a DDoS or SQL injection attempt. As a SOC analyst, which network architecture component would you recommend implementing to establish this isolated region?

A.

Demilitarized Zone (DMZ)

B.

Intrusion Detection System (IDS)

C.

Firewall

D.

Honeypot