Leads4pass > EC-COUNCIL > EC-COUNCIL Certifications > 312-39 > 312-39 Online Practice Questions and Answers

312-39 Online Practice Questions and Answers

Questions 4

Which of the following attack can be eradicated by using a safe API to avoid the use of the interpreter entirely?

A. Command Injection Attacks

B. SQL Injection Attacks

C. File Injection Attacks

D. LDAP Injection Attacks

Buy Now
Questions 5

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

A. Ransomware Attack

B. DoS Attack

C. DHCP starvation Attack

D. File Injection Attack

Buy Now
Questions 6

Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.

A. Failure Audit

B. Warning

C. Error

D. Information

Buy Now
Questions 7

Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks. What among the following should Wesley avoid from considering?

A. Deserialization of trusted data must cross a trust boundary

B. Understand the security permissions given to serialization and deserialization

C. Allow serialization for security-sensitive classes

D. Validate untrusted input, which is to be serialized to ensure that serialized data contain only trusted classes

Buy Now
Questions 8

Which of the following formula represents the risk levels?

A. Level of risk = Consequence x Severity

B. Level of risk = Consequence x Impact

C. Level of risk = Consequence x Likelihood

D. Level of risk = Consequence x Asset Value

Buy Now
Questions 9

Which of the following fields in Windows logs defines the type of event occurred, such as Correlation Hint, Response Time, SQM, WDI Context, and so on?

A. Keywords

B. Task Category

C. Level

D. Source

Buy Now
Questions 10

Which of the following tool is used to recover from web application incident?

A. CrowdStrike FalconTM Orchestrator

B. Symantec Secure Web Gateway

C. Smoothwall SWG

D. Proxy Workbench

Buy Now
Questions 11

Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.

A. DoS Attack

B. Man-In-Middle Attack

C. Ransomware Attack

D. Reconnaissance Attack

Buy Now
Questions 12

Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?

A. File Injection Attacks

B. URL Injection Attacks

C. LDAP Injection Attacks

D. Command Injection Attacks

Buy Now
Questions 13

If the SIEM generates the following four alerts at the same time:

I. Firewall blocking traffic from getting into the network alerts

II. SQL injection attempt alerts

III. Data deletion attempt alerts

IV.

Brute-force attempt alerts

Which alert should be given least priority as per effective alert triaging?

A.

III

B.

IV

C.

II

D.

I

Buy Now
Exam Code: 312-39
Exam Name: EC-Council Certified SOC Analyst (CSA)
Last Update: Jan 13, 2025
Questions: 100
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99