Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

312-39 Sample Questions Answers

Questions 4

As a Threat Hunter at a cybersecurity company, you notice several endpoints experiencing unusual outbound traffic to an unfamiliar IP address. The traffic is encrypted and occurs in small bursts at irregular intervals. There are no known IoCs associated with the destination, and traditional security tools have not flagged it as malicious. You decide to launch a threat-hunting initiative to determine whether this is an advanced persistent threat (APT) using sophisticated techniques to evade detection. The goal is to identify potential Indicators of Attack (IoAs) and map them against known adversary behaviors. What type of threat hunting approach is best suited for this situation?

Options:

A.

Unstructured hunting

B.

Situational or entity-driven hunting

C.

Reactive hunting

D.

Structured hunting

Buy Now
Questions 5

What is the process of monitoring and capturing all data packets passing through a given network using different tools?

Options:

A.

Network Scanning

B.

DNS Footprinting

C.

Network Sniffing

D.

Port Scanning

Buy Now
Questions 6

Which of the following attack inundates DHCP servers with fake DHCP requests toexhaust all available IP addresses?

Options:

A.

DHCP Starvation Attacks

B.

DHCP Spoofing Attack

C.

DHCP Port Stealing

D.

DHCP Cache Poisoning

Buy Now
Questions 7

Which of the following contains the performance measures, and proper project and time management details?

Options:

A.

Incident Response Policy

B.

Incident Response Tactics

C.

Incident Response Process

D.

Incident Response Procedures

Buy Now
Questions 8

You are a Level 1 SOC analyst at a critical infrastructure provider. Threat actors infiltrated the network and exfiltrated sensitive system blueprints. Before detection, they executed commands that altered system logs, wiped forensic artifacts, and modified timestamps to mimic normal activity. They also manipulated security monitoring tools to prevent unusual login events from being recorded. Which APT lifecycle phase does this represent?

Options:

A.

Search and Exfiltration

B.

Initial Intrusion

C.

Cleanup

D.

Expansion

Buy Now
Questions 9

Which of the following factors determine the choice of SIEM architecture?

Options:

A.

SMTP Configuration

B.

DHCP Configuration

C.

DNS Configuration

D.

Network Topology

Buy Now
Questions 10

John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare adashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.

Which of the following data source will he use to prepare the dashboard?

Options:

A.

DHCP/Logs capable of maintaining IP addresses or hostnames withIPtoName resolution.

B.

IIS/Web Server logs with IP addresses and user agent IPtouseragent resolution.

C.

DNS/ Web Server logs with IP addresses.

D.

Apache/ Web Server logs with IP addresses and Host Name.

Buy Now
Questions 11

A security team is designing SIEM use-case logic to detect privilege escalation attempts on Windows servers. They have already identified and validated the necessary event sources (e.g., Active Directory logs, Windows Security logs). What should be their next step in the use case logic development process?

Options:

A.

Define response actions for detected incidents before writing the rules

B.

Define correlation rules and conditions that detect specific privilege escalation patterns

C.

Implement and test the use case immediately in the production SIEM environment

D.

Collect historical security logs to confirm the use case is necessary

Buy Now
Questions 12

An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company’s URL as follows:

http://technosoft.com.com/ . Identify the attack demonstrated in the above scenario.

Options:

A.

Cross-site Scripting Attack

B.

SQL Injection Attack

C.

Denial-of-Service Attack

D.

Session Attack

Buy Now