Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified SOC Analyst (CSA) Question and Answers

Certified SOC Analyst (CSA)

Last Update Nov 30, 2025
Total Questions : 100

We are offering FREE 312-39 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-39 free exam questions and then go for complete pool of Certified SOC Analyst (CSA) test questions that will help you more.

312-39 pdf

312-39 PDF

$36.75  $104.99
312-39 Engine

312-39 Testing Engine

$43.75  $124.99
312-39 PDF + Engine

312-39 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?

Options:

A.  

$ tailf /var/log/sys/kern.log

B.  

$ tailf /var/log/kern.log

C.  

# tailf /var/log/messages

D.  

# tailf /var/log/sys/messages

Discussion 0
Questions 2

Jason, a SOC Analyst with Maximus Tech, was investigating Cisco ASA Firewall logs and came across the following log entry:

May 06 2018 21:27:27 asa 1: %ASA -5 – 11008: User 'enable_15' executed the 'configure term' command What does the security level in the above log indicates?

Options:

A.  

Warning condition message

B.  

Critical condition message

C.  

Normal but significant message

D.  

Informational message

Discussion 0
Questions 3

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.

What is Ray and his team doing?

Options:

A.  

Blocking the Attacks

B.  

Diverting the Traffic

C.  

Degrading the services

D.  

Absorbing the Attack

Discussion 0
Questions 4

Which of the following formula represents the risk?

Options:

A.  

Risk = Likelihood × Severity × Asset Value

B.  

Risk = Likelihood × Consequence × Severity

C.  

Risk = Likelihood × Impact × Severity

D.  

Risk = Likelihood × Impact × Asset Value

Discussion 0
Questions 5

John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.

Which of the following types of threat intelligence did he use?

Options:

A.  

Strategic Threat Intelligence

B.  

Technical Threat Intelligence

C.  

Tactical Threat Intelligence

D.  

Operational Threat Intelligence

Discussion 0
Questions 6

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.

Options:

A.  

rule-based

B.  

pull-based

C.  

push-based

D.  

signature-based

Discussion 0
Questions 7

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.

What kind of threat intelligence described above?

Options:

A.  

Tactical Threat Intelligence

B.  

Strategic Threat Intelligence

C.  

Functional Threat Intelligence

D.  

Operational Threat Intelligence

Discussion 0
Questions 8

Which of the following tool is used to recover from web application incident?

Options:

A.  

CrowdStrike FalconTM Orchestrator

B.  

Symantec Secure Web Gateway

C.  

Smoothwall SWG

D.  

Proxy Workbench

Discussion 0
Questions 9

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?

Options:

A.  

Create a Chain of Custody Document

B.  

Send it to the nearby police station

C.  

Set a Forensic lab

D.  

Call Organizational Disciplinary Team

Discussion 0
Questions 10

Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.

What does this event log indicate?

Options:

A.  

SQL Injection Attack

B.  

Parameter Tampering Attack

C.  

XSS Attack

D.  

Directory Traversal Attack

Discussion 0
Questions 11

In which phase of Lockheed Martin's – Cyber Kill Chain Methodology, adversary creates a deliverable malicious payload using an exploit and a backdoor?

Options:

A.  

Reconnaissance

B.  

Delivery

C.  

Weaponization

D.  

Exploitation

Discussion 0
Questions 12

John, SOC analyst wants to monitor the attempt of process creation activities from any of their Windows endpoints.

Which of following Splunk query will help him to fetch related logs associated with process creation?

Options:

A.  

index=windows LogName=Security EventCode=4678 NOT (Account_Name=*$) .. .. ... ..

B.  

index=windows LogName=Security EventCode=4688 NOT (Account_Name=*$) .. .. ..

C.  

index=windows LogName=Security EventCode=3688 NOT (Account_Name=*$) .. .. ..

D.  

index=windows LogName=Security EventCode=5688 NOT (Account_Name=*$) ... ... ...

Discussion 0
Questions 13

Robin, a SOC engineer in a multinational company, is planning to implement a SIEM. He realized that his organization is capable of performing only Correlation, Analytics, Reporting, Retention, Alerting, and Visualization required for the SIEM implementation and has to take collection and aggregation services from a Managed Security Services Provider (MSSP).

What kind of SIEM is Robin planning to implement?

Options:

A.  

Self-hosted, Self-Managed

B.  

Self-hosted, MSSP Managed

C.  

Hybrid Model, Jointly Managed

D.  

Cloud, Self-Managed

Discussion 0
Questions 14

Which of the following are the responsibilities of SIEM Agents?

1.Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.

2.Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine.

3.Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.

4.Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.

Options:

A.  

1 and 2

B.  

2 and 3

C.  

1 and 4

D.  

3 and 1

Discussion 0
Questions 15

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

Options:

A.  

SystemDrive%\inetpub\logs\LogFiles\W3SVCN

B.  

SystemDrive%\LogFiles\inetpub\logs\W3SVCN

C.  

%SystemDrive%\LogFiles\logs\W3SVCN

D.  

SystemDrive%\ inetpub\LogFiles\logs\W3SVCN

Discussion 0