Certified Soc Analyst: Eccouncil 312-39 Version Demo
Certified Soc Analyst: Eccouncil 312-39 Version Demo
ECCouncil 312-39
Version Demo
https://dumpsboss.com
[email protected]
QUESTION NO: 1
Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a
possible future problem.
A. Failure Audit
B. Warning
C. Error
D. Information
ANSWER: B
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/win32/eventlog/event-types
QUESTION NO: 2
Which of the following attack inundates DHCP servers with fake DHCP requests to exhaust all available IP addresses?
ANSWER: A
Explanation:
Reference: https://www.cbtnuggets.com/blog/technology/networking/what-is-a-dhcp-starvation-attack
QUESTION NO: 3
Banter is a threat analyst in Christine Group of Industries. As a part of the job, he is currently formatting and structuring the
raw data.
C. Collection
ANSWER: B
Explanation:
Reference: https://socradar.io/5-stages-of-the-threat-intelligence-lifecycle/
QUESTION NO: 4
A. SMTP Configuration
B. DHCP Configuration
C. DNS Configuration
D. Network Topology
ANSWER: C
QUESTION NO: 5
David is a SOC analyst in Karen Tech. One day an attack is initiated by the intruders but David was not able to find any
suspicious events.
ANSWER: C
QUESTION NO: 6
Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?
C. Router Logs
D. Switch Logs
ANSWER: B
QUESTION NO: 7
Which of the following threat intelligence is used by a SIEM for supplying the analysts with context and "situational
awareness" by using threat actor TTPs, malware campaigns, tools used by threat actors.
A. 2 and 3
B. 1 and 3
C. 3 and 4
D. 1 and 2
ANSWER: A
Explanation:
Reference: https://hodigital.blog.gov.uk/wp-content/uploads/sites/161/2020/03/Cyber-Threat-Intelligence-A-Guide-For-
Decision-Makers-and-Analysts-v2.0.pdf (38)
QUESTION NO: 8
Which of the following framework describes the essential characteristics of an organization's security engineering process
that must exist to ensure good security engineering?
A. COBIT
B. ITIL
C. SSE-CMM
ANSWER: C
Explanation:
Reference: https://www.iso.org/standard/44716.html
QUESTION NO: 9
Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.
ANSWER: B
Explanation:
Reference:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8gZaKq_PuAhWGi1wKHfQTC0oQFj
AAegQIARAD&url=https%3A%2F%2Fround-lake.dustinice.workers.dev%3A443%2Fhttps%2Fconf.splunk.com%
2Fsession%2F2014%2Fconf2014_FredWilmotSanfordOwings_Splunk_Security.pdf&usg=AOvVaw3ZLfzGqM-
VUG7xKtze67ac
QUESTION NO: 10
Which of the following Windows Event Id will help you monitors file sharing across the network?
A. 7045
B. 4625
C. 5140
D. 4624
ANSWER: C
Explanation: