Xcerts Certifications
Xcerts Certifications
Xcerts Certifications
Xcerts Certifications
[email protected] | http://Xcerts.com
ECCouncil
312-39
Certified SOC Analyst Exam
312-39
QUESTION: 1
Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident
from spreading?
Answer(s): B
QUESTION: 2
According to the forensics investigation process, what is the next step carried out right after
collecting the evidence?
Answer(s): A
QUESTION: 3
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
A. Planning and budgeting –> Physical location and structural design considerations –> Work
area considerations –> Human resource considerations –> Physical security recommendations
–> Forensics lab licensing
B. Planning and budgeting –> Physical location and structural design considerations–>
Forensics lab licensing –> Human resource considerations –> Work area considerations –>
Physical security recommendations
C. Planning and budgeting –> Forensics lab licensing –> Physical location and structural design
considerations –> Work area considerations –> Physical security recommendations –> Human
resource considerations
D. Planning and budgeting –> Physical location and structural design considerations –>
Forensics lab licensing –>Work area considerations –> Human resource considerations –>
Physical security recommendations
Answer(s): A
Reference:
https://info-savvy.com/setting-up-a-computer-forensics-lab/
QUESTION: 4
https://Xcerts.com 2
312-39
Which of the following directory will contain logs related to printer access?
A. /var/log/cups/Printer_log file
B. /var/log/cups/access_log file
C. /var/log/cups/accesslog file
D. /var/log/cups/Printeraccess_log file
Answer(s): A
QUESTION: 5
Which of the following command is used to enable logging in iptables?
Answer(s): B
Reference:
https://tecadmin.net/enable-logging-in-iptables-on-linux/
QUESTION: 6
Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected
by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to
provide additional bandwidth to the network devices and increasing the capacity of the servers.
Answer(s): D
QUESTION: 7
Identify the attack when an attacker by several trial and error can read the contents of a
password file present in the restricted etc folder just by manipulating the URL in the browser as
shown:
http://www.terabytes.com/process.php./../../../../etc/passwd
https://Xcerts.com 3