Eccouncil Certified SOC Analyst 312-39 Exam Practice Test

Page: 1 / 14
Total 100 questions
Question 1

Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks.

What among the following should Wesley avoid from considering?



Answer : C


Question 2

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?



Answer : A


Question 3

Charline is working as an L2 SOC Analyst. One day, an L1 SOC Analyst escalated an incident to her for further investigation and confirmation. Charline, after a thorough investigation, confirmed the incident and assigned it with an initial priority.

What would be her next action according to the SOC workflow?



Answer : D


Question 4

An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company's URL as follows:

http://technosoft.com.com/. Identify the attack demonstrated in the above scenario.



Answer : A


Question 5

Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?



Answer : A


Question 6

Which of the following can help you eliminate the burden of investigating false positives?



Answer : D


Question 7

Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords and their corresponding hash values to crack the password.



Answer : A


Page:    1 / 14   
Total 100 questions