312-39 Practice Test Questions

101 Questions


An organization is implementing and deploying the SIEM with following capabilities.

What kind of SIEM deployment architecture the organization is planning to implement?


A.

Cloud, MSSP Managed


B.

Self-hosted, Jointly Managed


C.

Self-hosted, Self-Managed


D.

Self-hosted, MSSP Managed





In which log collection mechanism, the system or application sends log records either on the local disk or over the network.


A.

rule-based


B.

pull-based


C.

push-based


D.

signature-based





Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating
files at /var/log/ wtmp.
What Chloe is looking at?


A.

Error log


B.

System boot log


C.

General message and system-related stuff


D.

Login records





Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?


A.

/etc/ossim/reputation


B.

/etc/ossim/siem/server/reputation/data


C.

/etc/siem/ossim/server/reputation.data


D.

/etc/ossim/server/reputation.data





According to the forensics investigation process, what is the next step carried out right after collecting the evidence?


A.

Create a Chain of Custody Document


B.

Send it to the nearby police station


C.

Set a Forensic lab


D.

Call Organizational Disciplinary Team





Which of the following command is used to enable logging in iptables?


A.

$ iptables -B INPUT -j LOG


B.

$ iptables -A OUTPUT -j LOG


C.

$ iptables -A INPUT -j LOG


D.

$ iptables -B OUTPUT -j LOG





Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.
What filter should Peter add to the 'show logging' command to get the required output?


A.

show logging | access 210


B.

show logging | forward 210


C.

show logging | include 210


D.

show logging | route 210





What does the HTTP status codes 1XX represents?


A.

Informational messag


B.

Client error


C.

Success


D.

Redirection





Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?


A.

threat_note


B.

MagicTree


C.

IntelMQ


D.

Malstrom





Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is
affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are
trying to provide additional bandwidth to the network devices and increasing the capacity of
the servers.
What is Ray and his team doing?


A.

Blocking the Attacks


B.

Diverting the Traffic


C.

Degrading the services


D.

Absorbing the Attack





Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs,
detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?


A.

SQL Injection Attack


B.

Parameter Tampering Attack


C.

XSS Attack


D.

Directory Traversal Attack





Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?


A.

Complaint to police in a formal way regarding the incident


B.

Turn off the infected machine


C.

Leave it to the network administrators to handle


D.

Call the legal department in the organization and inform about the incident






Page 2 out of 9 Pages
Previous