Free 312-39 Exam Braindumps (page: 13)

Page 12 of 26

Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?

  1. Windows Event Log
  2. Web Server Logs
  3. Router Logs
  4. Switch Logs

Answer(s): B



Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to find the purpose and scope of the planned incident response capabilities.

What is he looking for?

  1. Incident Response Intelligence
  2. Incident Response Mission
  3. Incident Response Vision
  4. Incident Response Resources

Answer(s): D


Reference:

https://blog.eccouncil.org/phases-of-an-incident-response-plan/



John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.

What does this event log indicate?

  1. XSS Attack
  2. SQL injection Attack
  3. Directory Traversal Attack
  4. Parameter Tampering Attack

Answer(s): A



According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?

NOTE: It is mandatory to answer the question before proceeding to the next one.

  1. High
  2. Extreme
  3. Low
  4. Medium

Answer(s): A


Reference:

https://onlinelibrary.wiley.com/page/journal/15396924/homepage/special_issue simple_characterisations_and_communication_of_risks.htm






Post your Comments and Discuss EC-Council 312-39 exam with other Community members:

312-39 Discussions & Posts