Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-39 Exam Dumps - Certified SOC Analyst (CSA)

Go to page:
Question # 17

Which of the following directory will contain logs related to printer access?

A.

/var/log/cups/Printer_log file

B.

/var/log/cups/access_log file

C.

/var/log/cups/accesslog file

D.

/var/log/cups/Printeraccess_log file

Full Access
Question # 18

Robin, a SOC engineer in a multinational company, is planning to implement a SIEM. He realized that his organization is capable of performing only Correlation, Analytics, Reporting, Retention, Alerting, and Visualization required for the SIEM implementation and has to take collection and aggregation services from a Managed Security Services Provider (MSSP).

What kind of SIEM is Robin planning to implement?

A.

Self-hosted, Self-Managed

B.

Self-hosted, MSSP Managed

C.

Hybrid Model, Jointly Managed

D.

Cloud, Self-Managed

Full Access
Question # 19

An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.

Original URL: http://www.buyonline.com/product.aspx?profile=12 &debit=100 Modified URL: http://www.buyonline.com/product.aspx?profile=12 &debit=10

Identify the attack depicted in the above scenario.

A.

Denial-of-Service Attack

B.

SQL Injection Attack

C.

Parameter Tampering Attack

D.

Session Fixation Attack

Full Access
Question # 20

Which of the following is a Threat Intelligence Platform?

A.

SolarWinds MS

B.

TC Complete

C.

Keepnote

D.

Apility.io

Full Access
Question # 21

Which of the following Windows features is used to enable Security Auditing in Windows?

A.

Bitlocker

B.

Windows Firewall

C.

Local Group Policy Editor

D.

Windows Defender

Full Access
Question # 22

What does Windows event ID 4740 indicate?

A.

A user account was locked out.

B.

A user account was disabled.

C.

A user account was enabled.

D.

A user account was created.

Full Access
Question # 23

Which of the following tool is used to recover from web application incident?

A.

CrowdStrike FalconTM Orchestrator

B.

Symantec Secure Web Gateway

C.

Smoothwall SWG

D.

Proxy Workbench

Full Access
Question # 24

Which of the following factors determine the choice of SIEM architecture?

A.

SMTP Configuration

B.

DHCP Configuration

C.

DNS Configuration

D.

Network Topology

Full Access
Go to page: