Free Certified SOC Analyst Exam 312-39 Exam Practice Test
312-39 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 100
-
Which of the following formula represents the risk?
Answer: 2 Next Question -
John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.Which of the following types of threat intelligence did he use?
Answer: 4 Next Question -
Which of the following tool is used to recover from web application incident?
Answer: 2 Next Question -
Whichof the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
Answer: 3 Next Question -
Which of the following Windows features is used to enable Security Auditing in Windows?
Answer: 3 Next Question -
Which of the following tool can be used to filter web requests associated with the SQL Injection attack?
Answer: 2 Next Question -
Which alert should be given least priority as per effective alert triaging?If the SIEM generates the following four alerts at the same time:
Answer: 1 Next Question -
Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?
Answer: 3 Next Question -
Robin , a SOC engineer in a multinational company, is planning to implement a SIEM. He realized that his organization is capable of performing only Correlation, Analytics, Reporting, Retention, Alerting, and Visualization required for the SIEM implementation and has to take collection and aggregation services from a Managed Security Services Provider (MSSP).What kind of SIEM is Robin planning to implement?
Answer: 2 Next Question -
Which of the following attack can be eradicated by filtering improper XML syntax?
Answer: 2 Next Question
Total Questions: 100
