Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-39 Practice Exam with Questions & Answers | Set: 2

Questions 11

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.

What kind of threat intelligence described above?

Options:
A.

Tactical Threat Intelligence

B.

Strategic Threat Intelligence

C.

Functional Threat Intelligence

D.

Operational Threat Intelligence

ECCouncil 312-39 Premium Access
Questions 12

Which of the following process refers to the discarding of the packets at the routing level without informing the source that the data did not reach its intended recipient?

Options:
A.

Load Balancing

B.

Rate Limiting

C.

Black Hole Filtering

D.

Drop Requests

Questions 13

Bonney's system has been compromised by a gruesome malware.

What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?

Options:
A.

Complaint to police in a formal way regarding the incident

B.

Turn off the infected machine

C.

Leave it to the network administrators to handle

D.

Call the legal department in the organization and inform about the incident

Questions 14

Which of the following tool is used to recover from web application incident?

Options:
A.

CrowdStrike FalconTM Orchestrator

B.

Symantec Secure Web Gateway

C.

Smoothwall SWG

D.

Proxy Workbench

Questions 15

An organization wants to implement a SIEM deployment architecture. However, they have the capability to do only log collection and the rest of the SIEM functions must be managed by an MSSP.

Which SIEM deployment architecture will the organization adopt?

Options:
A.

Cloud, MSSP Managed

B.

Self-hosted, Jointly Managed

C.

Self-hosted, MSSP Managed

D.

Self-hosted, Self-Managed

Questions 16

Which of the following attack can be eradicated by filtering improper XML syntax?

Options:
A.

CAPTCHA Attacks

B.

SQL Injection Attacks

C.

Insufficient Logging and Monitoring Attacks

D.

Web Services Attacks

Questions 17

David is a SOC analyst in Karen Tech. One day an attack is initiated by the intruders but David was not able to find any suspicious events.

This type of incident is categorized into?

Options:
A.

True Positive Incidents

B.

False positive Incidents

C.

True Negative Incidents

D.

False Negative Incidents

Questions 18

Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?

Options:
A.

Rule-based detection

B.

Heuristic-based detection

C.

Anomaly-based detection

D.

Signature-based detection

Questions 19

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

Options:
A.

Ransomware Attack

B.

DoS Attack

C.

DHCP starvation Attack

D.

File Injection Attack

Questions 20

Which of the following fields in Windows logs defines the type of event occurred, such as Correlation Hint, Response Time, SQM, WDI Context, and so on?

Options:
A.

Keywords

B.

Task Category

C.

Level

D.

Source