Download ECCouncil.312-39.VCEplus.2021-03-18.100q.vcex

Download Exam

File Info

Exam Certified SOC Analyst
Number 312-39
File Name ECCouncil.312-39.VCEplus.2021-03-18.100q.vcex
Size 919 KB
Posted Mar 18, 2021
Download ECCouncil.312-39.VCEplus.2021-03-18.100q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Bonney's system has been compromised by a gruesome malware.  
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?


  1. Complaint to police in a formal way regarding the incident
  2. Turn off the infected machine
  3. Leave it to the network administrators to handle
  4. Call the legal department in the organization and inform about the incident
Correct answer: B



Question 2

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?


  1. Create a Chain of Custody Document
  2. Send it to the nearby police station
  3. Set a Forensic lab
  4. Call Organizational Disciplinary Team
Correct answer: A



Question 3

Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?


  1. Planning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing 
  2. Planning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations
  3. Planning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations
  4. Planning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical security recommendations
Correct answer: A
Explanation:
Reference: https://info-savvy.com/setting-up-a-computer-forensics-lab/
Reference: 
https://info-savvy.com/setting-up-a-computer-forensics-lab/



Question 4

Which of the following directory will contain logs related to printer access?


  1. /var/log/cups/Printer_log file
  2. /var/log/cups/access_log file
  3. /var/log/cups/accesslog file
  4. /var/log/cups/Printeraccess_log file
Correct answer: A



Question 5

Which of the following command is used to enable logging in iptables?


  1. $ iptables -B INPUT -j LOG
  2. $ iptables -A OUTPUT -j LOG
  3. $ iptables -A INPUT -j LOG
  4. $ iptables -B OUTPUT -j LOG
Correct answer: B
Explanation:
Reference: https://tecadmin.net/enable-logging-in-iptables-on-linux/
Reference: 
https://tecadmin.net/enable-logging-in-iptables-on-linux/



Question 6

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.  
What is Ray and his team doing?


  1. Blocking the Attacks  
  2. Diverting the Traffic
  3. Degrading the services
  4. Absorbing the Attack
Correct answer: D



Question 7

Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown: 
http://www.terabytes.com/process.php./../../../../etc/passwd


  1. Directory Traversal Attack
  2. SQL Injection Attack
  3. Denial-of-Service Attack
  4. Form Tampering Attack
Correct answer: B
Explanation:
Reference: https://doc.lagout.org/security/SQL%20Injection%20Attacks%20and%20Defense.pdf
Reference: 
https://doc.lagout.org/security/SQL%20Injection%20Attacks%20and%20Defense.pdf



Question 8

Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?  
 


  1. Unicode Encoding
  2. UTF Encoding
  3. Base64 Encoding
  4. URL Encoding
Correct answer: D
Explanation:
Reference: https://ktflash.gitbooks.io/ceh_v9/content/125_countermeasures.html
Reference: 
https://ktflash.gitbooks.io/ceh_v9/content/125_countermeasures.html



Question 9

Which of the following formula represents the risk?


  1. Risk = Likelihood × Severity × Asset Value
  2. Risk = Likelihood × Consequence × Severity
  3. Risk = Likelihood × Impact × Severity
  4. Risk = Likelihood × Impact × Asset Value
Correct answer: B



Question 10

The Syslog message severity levels are labelled from level 0 to level 7.  
What does level 0 indicate?


  1. Alert
  2. Notification
  3. Emergency
  4. Debugging
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files