Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-39 Practice Exam with Questions & Answers | Set: 6

Questions 51

The SOC team found a suspicious document file on a user's workstation. Upon initial inspection, the document appears benign, but deeper analysis reveals an embedded PowerShell script. The team suspects the script is designed to download and execute a malicious payload. They need to understand the script's functionality without triggering it. Which malware analysis technique is recommended to understand the PowerShell script's functionality without executing it?

Options:
A.

Static analysis

B.

Dynamic analysis

C.

Automated behavioral analysis

D.

Network traffic analysis

ECCouncil 312-39 Premium Access
Questions 52

As a Threat Hunter at a cybersecurity company, you notice several endpoints experiencing unusual outbound traffic to an unfamiliar IP address. The traffic is encrypted and occurs in small bursts at irregular intervals. There are no known IoCs associated with the destination, and traditional security tools have not flagged it as malicious. You decide to launch a threat-hunting initiative to determine whether this is an advanced persistent threat (APT) using sophisticated techniques to evade detection. The goal is to identify potential Indicators of Attack (IoAs) and map them against known adversary behaviors. What type of threat hunting approach is best suited for this situation?

Options:
A.

Unstructured hunting

B.

Situational or entity-driven hunting

C.

Reactive hunting

D.

Structured hunting

Questions 53

Identify the HTTP status codes that represents the server error.

Options:
A.

2XX

B.

4XX

C.

1XX

D.

5XX

Questions 54

Identify the type of attack, an attacker is attempting on www.example.com website.

Options:
A.

Cross-site Scripting Attack

B.

Session Attack

C.

Denial-of-Service Attack

D.

SQL Injection Attack

Questions 55

A large financial organization has experienced an increase in sophisticated cyber threats, including zero-day attacks and APTs. Traditional detection relies heavily on signatures and manual intervention, causing delays. The CISO is exploring AI-driven solutions that can automatically analyze large datasets, detect anomalies, and adapt to evolving threats in real time—identifying suspicious activity without predefined signatures and with minimal human oversight. Which key AI technology should the organization focus on?

Options:
A.

Static IP blocking

B.

Machine learning (ML)

C.

Natural language processing (NLP)

D.

Heuristic-based signature detection

Questions 56

During routine monitoring, the SIEM detects an unusual spike in outbound data transfer from a critical database server. The typical outbound traffic for this server is around 5 MB/hour, but in the past 10 minutes, it has sent over 500 MB to an external IP address. No predefined signatures match this activity, but the SIEM raises an alert due to deviations from the server’s normal behavior profile. Which detection method is responsible for this alert?

Options:
A.

Heuristic-based detection

B.

Signature-based detection

C.

Rule-based detection

D.

Anomaly-based detection

Questions 57

Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?

Options:
A.

Rule-based detection

B.

Heuristic-based detection

C.

Anomaly-based detection

D.

Signature-based detection

Questions 58

John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.

Which of the following types of threat intelligence did he use?

Options:
A.

Strategic Threat Intelligence

B.

Technical ThreatIntelligence

C.

Tactical Threat Intelligence

D.

Operational Threat Intelligence

Questions 59

Global Bank relies heavily on Microsoft Azure to host critical banking applications and services. The SOC must ensure continuous monitoring, compliance, and real-time threat detection across Azure resources. They need a comprehensive solution to collect, analyze, and visualize telemetry from cloud resources, VMs, storage, and applications, and integrate with security tools to detect anomalies and monitor performance. Which Azure service is best suited?

Options:
A.

Azure Firewall

B.

Azure Monitor

C.

Azure Policy

D.

Azure Active Directory

Questions 60

Which of the following tool is used to recover from web application incident?

Options:
A.

CrowdStrike FalconTM Orchestrator

B.

Symantec Secure Web Gateway

C.

Smoothwall SWG

D.

Proxy Workbench

Exam Code: 312-39
Certification Provider: ECCouncil
Exam Name: Certified SOC Analyst (CSA v2)
Last Update: Feb 21, 2026
Questions: 200