Free 312-39 Exam Braindumps (page: 8)

Page 7 of 26

Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?

  1. Rule-based detection
  2. Heuristic-based detection
  3. Anomaly-based detection
  4. Signature-based detection

Answer(s): C



Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords and their corresponding hash values to crack the password.

  1. Dictionary Attack
  2. Rainbow Table Attack
  3. Bruteforce Attack
  4. Syllable Attack

Answer(s): A


Reference:

https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf



Which of the log storage method arranges event logs in the form of a circular buffer?

  1. FIFO
  2. LIFO
  3. non-wrapping
  4. wrapping

Answer(s): A


Reference:

https://en.wikipedia.org/wiki/Circular_buffer



An organization wants to implement a SIEM deployment architecture. However, they have the capability to do only log collection and the rest of the SIEM functions must be managed by an MSSP.

Which SIEM deployment architecture will the organization adopt?

  1. Cloud, MSSP Managed
  2. Self-hosted, Jointly Managed
  3. Self-hosted, MSSP Managed
  4. Self-hosted, Self-Managed

Answer(s): C






Post your Comments and Discuss EC-Council 312-39 exam with other Community members:

312-39 Discussions & Posts