CSA 100 - CSA 100 PDF

Title CSA 100 - CSA 100
Author Anonymous User
Course International Project Management
Institution University of Dhaka
Pages 30
File Size 807.8 KB
File Type PDF
Total Downloads 6
Total Views 149

Summary

CSA 100...


Description

312-39.VCEplus.premium.exam.100q Number: 312-39 Passing Score: 800 Time Limit: 120 min File Version: 1.0

Website: https://vceplus.com VCE to PDF Converter: https://vceplus.com/vce-to-pdf/ Facebook: https://www.facebook.com/VCE.For.All.VN/ Twitter : https://twitter.com/VCE_Plus 312-39 Certified SOC Analyst

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

Exam A QUESTION 1 Bonney's system has been compromised by a gruesome malware. What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading? A. Complaint to police in a formal way regarding the incident B. Turn off the infected machine C. Leave it to the network administrators to handle D. Call the legal department in the organization and inform about the incident Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 2 According to the forensics investigation process, what is the next step carried out right after collecting the evidence? A. Create a Chain of Custody Document B. Send it to the nearby police station C. Set a Forensic lab D. Call Organizational Disciplinary Team Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 3 Which one of the following is the correct flow for Setting Up a Computer Forensics Lab? A. Planning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing B. Planning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations C. Planning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations D. Planning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical security recommendations Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://info-savvy.com/setting-up-a-computer-forensics-lab/ QUESTION 4 Which of the following directory will contain logs related to printer access? A. /var/log/cups/Printer_log file B. /var/log/cups/access_log file C. /var/log/cups/accesslog file D. /var/log/cups/Printeraccess_log file Correct Answer: A

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

Section: (none) Explanation Explanation/Reference: QUESTION 5 Which of the following command is used to enable logging in iptables? A. $ iptables -B INPUT -j LOG B. $ iptables -A OUTPUT -j LOG C. $ iptables -A INPUT -j LOG D. $ iptables -B OUTPUT -j LOG Correct Answer: B Section: (none) Explanation Explanation/Reference: Reference: https://tecadmin.net/enable-logging-in-iptables-on-linux/ QUESTION 6 Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers. What is Ray and his team doing? A. Blocking the Attacks B. Diverting the Traffic C. Degrading the services D. Absorbing the Attack Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 7 Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown: http://www.terabytes.com/process.php./../../../../etc/passwd A. Directory Traversal Attack B. SQL Injection Attack C. Denial-of-Service Attack D. Form Tampering Attack Correct Answer: B Section: (none) Explanation Explanation/Reference: Reference: https://doc.lagout.org/security/SQL%20Injection%20Attacks%20and%20Defense.pdf QUESTION 8 Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

A. Unicode Encoding B. UTF Encoding C. Base64 Encoding D. URL Encoding Correct Answer: D Section: (none) Explanation Explanation/Reference: Reference: https://ktflash.gitbooks.io/ceh_v9/content/125_countermeasures.html QUESTION 9 Which of the following formula represents the risk? A. Risk = Likelihood × Severity × Asset Value B. Risk = Likelihood × Consequence × Severity C. Risk = Likelihood × Impact × Severity D. Risk = Likelihood × Impact × Asset Value Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 10 The Syslog message severity levels are labelled from level 0 to level 7. What does level 0 indicate? A. Alert B. Notification C. Emergency D. Debugging Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 11 Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM? A. /etc/ossim/reputation B. /etc/ossim/siem/server/reputation/data C. /etc/siem/ossim/server/reputation.data D. /etc/ossim/server/reputation.data Correct Answer: A Section: (none) Explanation Explanation/Reference:

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

QUESTION 12 According to the Risk Matrix table, what will be the risk level when the probability of an attack is very low and the impact of that attack is major? A. High B. Extreme C. Low D. Medium Correct Answer: C Section: (none) Explanation Explanation/Reference: Reference: https://www.moheri.gov.om/userupload/Policy/IT%20Risk%20Management%20Framework.pdf (17) QUESTION 13 Which of the following command is used to view iptables logs on Ubuntu and Debian distributions? A. $ tailf /var/log/sys/kern.log B. $ tailf /var/log/kern.log C. # tailf /var/log/messages D. # tailf /var/log/sys/messages Correct Answer: B Section: (none) Explanation Explanation/Reference: Reference: https://tecadmin.net/enable-logging-in-iptables-on-linux/ QUESTION 14 Which of the following technique involves scanning the headers of IP packets leaving a network to make sure that the unauthorized or malicious traffic never leaves the internal network? A. Egress Filtering B. Throttling C. Rate Limiting D. Ingress Filtering Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://grokdesigns.com/wp-content/uploads/2018/04/CEH-v9-Notes.pdf (99) QUESTION 15 Which of the following formula is used to calculate the EPS of the organization? A. EPS = average number of correlated events / time in seconds B. EPS = number of normalized events / time in seconds C. EPS = number of security events / time in seconds D. EPS = number of correlated events / time in seconds Correct Answer: A Section: (none) Explanation Explanation/Reference:

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

QUESTION 16 Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads. What does this indicate? A. Concurrent VPN Connections Attempt B. DNS Exfiltration Attempt C. Covering Tracks Attempt D. DHCP Starvation Attempt Correct Answer: B Section: (none) Explanation Explanation/Reference: Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8gZaKq_PuAhWGi1wKHfQTC0oQFjAAegQIARAD&url=https%3A%2F%2Fconf.splunk.com%2Fsession%2F2014% 2Fconf2014_FredWilmotSanfordOwings_Splunk_Security.pdf&usg=AOvVaw3ZLfzGqM-VUG7xKtze67ac QUESTION 17 An organization is implementing and deploying the SIEM with following capabilities.

What kind of SIEM deployment architecture the organization is planning to implement? A. Cloud, MSSP Managed B. Self-hosted, Jointly ManagedC. Self-hosted, Self-Managed D. Self-hosted, MSSP Managed Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 18 What is the process of monitoring and capturing all data packets passing through a given network using different tools? A. Network Scanning B. DNS Footprinting

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

C. Network Sniffing D. Port Scanning Correct Answer: C Section: (none) Explanation Explanation/Reference: Reference: https://www.greycampus.com/opencampus/ethical-hacking/sniffing-and-its-types QUESTION 19 Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process? A. threat_note B. MagicTree C. IntelMQ D. Malstrom Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 20 Which of the following Windows features is used to enable Security Auditing in Windows? A. Bitlocker B. Windows Firewall C. Local Group Policy Editor D. Windows Defender Correct Answer: C Section: (none) Explanation Explanation/Reference: Reference: https://resources.infosecinstitute.com/topic/how-to-audit-windows-10-application-logs/ QUESTION 21 Which of the following attack can be eradicated by filtering improper XML syntax? A. CAPTCHA Attacks B. SQL Injection Attacks C. Insufficient Logging and Monitoring Attacks D. Web Services Attacks Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 22 Which of the following attack can be eradicated by using a safe API to avoid the use of the interpreter entirely? A. Command Injection Attacks

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

B. SQL Injection Attacks C. File Injection Attacks D. LDAP Injection Attacks Correct Answer: B Section: (none) Explanation Explanation/Reference: Reference: https://www.kiuwan.com/owasp-top-10-a1-injection/ QUESTION 23 Shawn is a security manager working at Lee Inc Solution. His organization wants to develop threat intelligent strategy plan. As a part of threat intelligent strategy plan, he suggested various components, such as threat intelligence requirement analysis, intelligence and collection planning, asset identification, threat reports, and intelligence buy-in. Which one of the following components he should include in the above threat intelligent strategy plan to make it effective? A. Threat pivoting B. Threat trending C. Threat buy-in D. Threat boosting Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 24 Which of the following can help you eliminate the burden of investigating false positives? A. Keeping default rules B. Not trusting the security devices C. Treating every alert as high level D. Ingesting the context data Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://stratozen.com/9-ways-eliminate-siem-false-positives/ QUESTION 25 Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)? A. Rule-based detection B. Heuristic-based detection C. Anomaly-based detection D. Signature-based detection Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 26

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords and their corresponding hash values to crack the password. A. Dictionary Attack B. Rainbow Table Attack C. Bruteforce Attack D. Syllable Attack Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf QUESTION 27 Which of the log storage method arranges event logs in the form of a circular buffer? A. FIFO B. LIFO C. non-wrapping D. wrapping Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://en.wikipedia.org/wiki/Circular_buffer QUESTION 28 An organization wants to implement a SIEM deployment architecture. However, they have the capability

st of the SIEM functions must be managed by an MSSP.

Which SIEM deployment architecture will the organization adopt? A. Cloud, MSSP Managed B. Self-hosted, Jointly Managed C. Self-hosted, MSSP Managed D. Self-hosted, Self-Managed Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 29 Banter is a threat analyst in Christine Group of Industries. As a part of the job, he is currently formatting and structuring the raw data. He is at which stage of the threat intelligence life cycle? A. Dissemination and Integration B. Processing and Exploitation C. Collection D. Analysis and Production Correct Answer: B

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

Section: (none) Explanation Explanation/Reference: Reference: https://socradar.io/5-stages-of-the-threat-intelligence-lifecycle/ QUESTION 30 Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed? A. Ransomware Attack B. DoS Attack C. DHCP starvation Attack D. File Injection Attack Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://www.netfort.com/category/ransomware-detection/ QUESTION 31 Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system? A. De-Militarized Zone (DMZ) B. Firewall C. Honeypot D. Intrusion Detection System Correct Answer: C Section: (none) Explanation Explanation/Reference: Reference: https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot QUESTION 32 Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem. A. Failure Audit B. Warning C. Error D. Information Correct Answer: B Section: (none) Explanation Explanation/Reference: Reference: https://docs.microsoft.com/en-us/windows/win32/eventlog/event-types QUESTION 33 Which of the following factors determine the choice of SIEM architecture? A. SMTP Configuration B. DHCP Configuration C. DNS Configuration D. Network Topology

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 34 What does HTTPS Status code 403 represents? A. Unauthorized Error B. Not Found Error C. Internal Server Error D. Forbidden Error Correct Answer: D Section: (none) Explanation Explanation/Reference: Reference: https://en.wikipedia.org/wiki/HTTP_403 QUESTION 35 Which of the following Windows event is logged every time when a user tries to access the "Registry" key? A. 4656 B. 4663 C. 4660 D. 4657 Correct Answer: D Section: (none) Explanation Explanation/Reference: Reference: https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4657 QUESTION 36 Which of the following are the responsibilities of SIEM Agents? 1. Collecting data received from various devices sending data to SIEM before forwarding it to the central engine. 2. Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine. 3. Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine. 4. Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine. A. 1 and 2 B. 2 and 3 C. 1 and 4 D. 3 and 1 Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 37 Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

What does this event log indicate? A. SQL Injection Attack B. Parameter Tampering Attack C. XSS Attack D. Directory Traversal Attack Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=001f5e09-88b4-4a9a-b310-4c20578eecf9&CommunityKey=1ecf5f55-9545-44d6-b0f44e4a7f5f5e68&tab=librarydocuments QUESTION 38 Which of the following framework describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering? A. COBIT B. ITIL C. SSE-CMM D. SOC-CMM Correct Answer: C Section: (none) Explanation Explanation/Reference: Reference: https://www.iso.org/standard/44716.html QUESTION 39 What does Windows event ID 4740 indicate? A. A user account was locked out. B. A user account was disabled. C. A user account was enabled. D. A user account was created. Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4740#:~:text=For%204740(S)%3A%20A,Security%20ID”%20is%20not%20SYSTEM. QUESTION 40 Which of the following is a Threat Intelligence Platform? A. SolarWinds MS B. TC Complete C. Keepnote D. Apility.io Correct Answer: A Section: (none) Explanation Explanation/Reference:

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

Reference: https://www.esecurityplanet.com/products/threat-intelligence-platforms/ QUESTION 41 A type of threat intelligent that find out the information about the attacker by misleading them is known as __________. A. Threat trending Intelligence B. Detection Threat Intelligence C. Operational Intelligence D. Counter Intelligence Correct Answer: C Section: (none) Explanation Explanation/Reference: Reference: https://www.recordedfuture.com/threat-intelligence/ QUESTION 42 Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/wtmp. What Chloe is looking at? A. Error log B. System boot log C. General message and system-related stuff D. Login records Correct Answer: D Section: (none) Explanation Explanation/Reference: Reference: https://stackify.com/linux-logs/ QUESTION 43 Which of the following threat intelligence is used by a SIEM for supplying the analysts with context and "situational awareness" by using threat actor TTPs, malware campaigns, tools used by threat actors. 1. Strategic threat intelligence 2. Tactical threat intelligence 3. Operational threat intelligence 4. Technical threat intelligence A. 2 and 3 B. 1 and 3 C. 3 and 4 D. 1 and 2 Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://hodigital.blog.gov.uk/wp-content/uploads/sites/161/2020/03/Cyber-Threat-Intelligence-A-Guide-For-Decision-Makers-and-Analysts-v2.0.pdf (38) QUESTION 44 Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs. What does these TTPs refer to?

www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com

A. Tactics, Techniques, and Procedures B. Tactics, Threats, and Procedures C. Targets, Threats, and Process D. Tactics, Targets, and Process Correct Answer: A Section: (none) Explanation Explanation/Reference: Reference: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intelligence.pdf QUESTION 45 Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents? A. Windows Event Log B. Web Server Logs C. Router Logs D. Switch Logs Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 46 Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to

planned incident response capabilities.

What is he looking for? A. Incident Response Intelligence B. Incident Response Mission C. Incident Response Vision D. Incident Response Resources Correct Answer: D Section: (none) Explanation Explanation/Reference: Reference: https://b...


Similar Free PDFs