Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-39 Exam Dumps - Certified SOC Analyst (CSA)

Go to page:
Question # 9

Which of the log storage method arranges event logs in the form of a circular buffer?

A.

FIFO

B.

LIFO

C.

non-wrapping

D.

wrapping

Full Access
Question # 10

What does the HTTP status codes 1XX represents?

A.

Informational message

B.

Client error

C.

Success

D.

Redirection

Full Access
Question # 11

Which of the following are the responsibilities of SIEM Agents?

1.Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.

2.Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine.

3.Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.

4.Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.

A.

1 and 2

B.

2 and 3

C.

1 and 4

D.

3 and 1

Full Access
Question # 12

What does HTTPS Status code 403 represents?

A.

Unauthorized Error

B.

Not Found Error

C.

Internal Server Error

D.

Forbidden Error

Full Access
Question # 13

Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:

http://www.terabytes.com/process.php./../../../../etc/passwd

A.

Directory Traversal Attack

B.

SQL Injection Attack

C.

Denial-of-Service Attack

D.

Form Tampering Attack

Full Access
Question # 14

InfoSystem LLC, a US-based company, is establishing an in-house SOC. John has been given the responsibility to finalize strategy, policies, and procedures for the SOC.

Identify the job role of John.

A.

Security Analyst – L1

B.

Chief Information Security Officer (CISO)

C.

Security Engineer

D.

Security Analyst – L2

Full Access
Question # 15

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the 'show logging' command to get the required output?

A.

show logging | access 210

B.

show logging | forward 210

C.

show logging | include 210

D.

show logging | route 210

Full Access
Question # 16

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

A.

Ransomware Attack

B.

DoS Attack

C.

DHCP starvation Attack

D.

File Injection Attack

Full Access
Go to page: