Free 312-39 Exam Braindumps (page: 9)

Page 8 of 26

Banter is a threat analyst in Christine Group of Industries. As a part of the job, he is currently formatting and structuring the raw data.

He is at which stage of the threat intelligence life cycle?

  1. Dissemination and Integration
  2. Processing and Exploitation
  3. Collection
  4. Analysis and Production

Answer(s): B


Reference:

https://socradar.io/5-stages-of-the-threat-intelligence-lifecycle/



Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

  1. Ransomware Attack
  2. DoS Attack
  3. DHCP starvation Attack
  4. File Injection Attack

Answer(s): A


Reference:

https://www.netfort.com/category/ransomware-detection/



Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

  1. De-Militarized Zone (DMZ)
  2. Firewall
  3. Honeypot
  4. Intrusion Detection System

Answer(s): C


Reference:

https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot



Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.

  1. Failure Audit
  2. Warning
  3. Error
  4. Information

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/windows/win32/eventlog/event-types






Post your Comments and Discuss EC-Council 312-39 exam with other Community members:

312-39 Discussions & Posts