Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-39 Practice Exam with Questions & Answers

Questions 1

What does the HTTP status codes 1XX represents?

Options:
A.

Informational message

B.

Client error

C.

Success

D.

Redirection

ECCouncil 312-39 Premium Access
Questions 2

Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?

Options:
A.

$ tailf /var/log/sys/kern.log

B.

$ tailf /var/log/kern.log

C.

# tailf /var/log/messages

D.

# tailf /var/log/sys/messages

Questions 3

Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.

What does this event log indicate?

Options:
A.

SQL Injection Attack

B.

Parameter Tampering Attack

C.

XSS Attack

D.

Directory Traversal Attack

Questions 4

Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Options:
A.

Analytical Threat Intelligence

B.

Operational Threat Intelligence

C.

Strategic Threat Intelligence

D.

Tactical Threat Intelligence

Questions 5

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?

NOTE: It is mandatory to answer the question before proceeding to the next one.

Options:
A.

High

B.

Extreme

C.

Low

D.

Medium

Questions 6

Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?

Options:
A.

threat_note

B.

MagicTree

C.

IntelMQ

D.

Malstrom

Questions 7

Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to find the purpose and scope of the planned incident response capabilities.

What is he looking for?

Options:
A.

Incident Response Intelligence

B.

Incident Response Mission

C.

Incident Response Vision

D.

Incident Response Resources

Questions 8

Jony, a security analyst, while monitoring IIS logs, identified events shown in the figure below.

312-39 Question 8

What does this event log indicate?

Options:
A.

Parameter Tampering Attack

B.

XSS Attack

C.

Directory Traversal Attack

D.

SQL Injection Attack

Questions 9

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?

Options:
A.

Evidence Gathering

B.

Evidence Handling

C.

Eradication

D.

Systems Recovery

Questions 10

Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?

Options:
A.

Rate Limiting

B.

Egress Filtering

C.

Ingress Filtering

D.

Throttling