312-39 Practice Test Questions

101 Questions


An organization is implementing and deploying the SIEM with following capabilities.

What kind of SIEM deployment architecture the organization is planning to implement?


A.

Cloud, MSSP Managed


B.

Self-hosted, Jointly Managed


C.

Self-hosted, Self-Managed


D.

Self-hosted, MSSP Managed





A.
  

Cloud, MSSP Managed



In which log collection mechanism, the system or application sends log records either on the local disk or over the network.


A.

rule-based


B.

pull-based


C.

push-based


D.

signature-based





A.
  

rule-based



Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating
files at /var/log/ wtmp.
What Chloe is looking at?


A.

Error log


B.

System boot log


C.

General message and system-related stuff


D.

Login records





D.
  

Login records



Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?


A.

/etc/ossim/reputation


B.

/etc/ossim/siem/server/reputation/data


C.

/etc/siem/ossim/server/reputation.data


D.

/etc/ossim/server/reputation.data





A.
  

/etc/ossim/reputation



According to the forensics investigation process, what is the next step carried out right after collecting the evidence?


A.

Create a Chain of Custody Document


B.

Send it to the nearby police station


C.

Set a Forensic lab


D.

Call Organizational Disciplinary Team





A.
  

Create a Chain of Custody Document



Which of the following command is used to enable logging in iptables?


A.

$ iptables -B INPUT -j LOG


B.

$ iptables -A OUTPUT -j LOG


C.

$ iptables -A INPUT -j LOG


D.

$ iptables -B OUTPUT -j LOG





B.
  

$ iptables -A OUTPUT -j LOG



Reference: https://tecadmin.net/enable-logging-in-iptables-on-linux/

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.
What filter should Peter add to the 'show logging' command to get the required output?


A.

show logging | access 210


B.

show logging | forward 210


C.

show logging | include 210


D.

show logging | route 210





C.
  

show logging | include 210



What does the HTTP status codes 1XX represents?


A.

Informational messag


B.

Client error


C.

Success


D.

Redirection





A.
  

Informational messag



Reference:
https://en.wikipedia.org/wiki/List_of_HTTP_status_codes#:~:text=1xx-informational%
20response-–-the-request,syntax-or-cannot-be-fulfilled

Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?


A.

threat_note


B.

MagicTree


C.

IntelMQ


D.

Malstrom





C.
  

IntelMQ



Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is
affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are
trying to provide additional bandwidth to the network devices and increasing the capacity of
the servers.
What is Ray and his team doing?


A.

Blocking the Attacks


B.

Diverting the Traffic


C.

Degrading the services


D.

Absorbing the Attack





D.
  

Absorbing the Attack



Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs,
detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?


A.

SQL Injection Attack


B.

Parameter Tampering Attack


C.

XSS Attack


D.

Directory Traversal Attack





A.
  

SQL Injection Attack



Reference: https://community.broadcom.com/symantecenterprise/communities/communityhome/
librarydocuments/viewdocument?DocumentKey=001f5e09-88b4-4a9a-b310-
4c20578eecf9&CommunityKey=1ecf5f55-9545-44d6-b0f4-
4e4a7f5f5e68&tab=librarydocuments

Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?


A.

Complaint to police in a formal way regarding the incident


B.

Turn off the infected machine


C.

Leave it to the network administrators to handle


D.

Call the legal department in the organization and inform about the incident





B.
  

Turn off the infected machine




Page 2 out of 9 Pages
Previous