Free 312-39 Exam Braindumps

Pass your Certified SOC Analyst (CSA) exam with these free Questions and Answers

Page 2 of 20
QUESTION 1

Which of the following attack inundates DHCP servers with fake DHCP requests to exhaust all available IP addresses?

  1. A. DHCP Starvation Attacks
  2. B. DHCP Spoofing Attack
  3. C. DHCP Port Stealing
  4. D. DHCP Cache Poisoning

Correct Answer: A

QUESTION 2

Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?

  1. A. Planning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing
  2. B. Planning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations
  3. C. Planning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations
  4. D. Planning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical securityrecommendations

Correct Answer: A

QUESTION 3

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.
What is Ray and his team doing?

  1. A. Blocking the Attacks
  2. B. Diverting the Traffic
  3. C. Degrading the services
  4. D. Absorbing the Attack

Correct Answer: D

QUESTION 4

Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?

  1. A. File Injection Attacks
  2. B. URL Injection Attacks
  3. C. LDAP Injection Attacks
  4. D. Command Injection Attacks

Correct Answer: B

QUESTION 5

John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(.|(%|%)2E)(.|(%|%)2E)(/|(%|%)2F|\|(%|%)5C)/i.
What does this event log indicate?

  1. A. XSS Attack
  2. B. SQL injection Attack
  3. C. Directory Traversal Attack
  4. D. Parameter Tampering Attack

Correct Answer: A

Page 2 of 20

Post your Comments and Discuss EC-Council 312-39 exam with other Community members: