ECCouncil 312-39 - Certified SOC Analyst (CSA)
John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.
Which of the following data source will he use to prepare the dashboard?
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
Which of the following data source will a SOC Analyst use to monitor connections to the insecure ports?
Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.
What is Ray and his team doing?
Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?
Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?
Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?
What is the correct sequence of SOC Workflow?