ECCouncil 312-39v2 - Certified SOC Analyst (CSA) v2 Exam

Question #1 (Topic: Exam A)
A SIEM alert is triggered due to unusual network traffic involving NetBIOS. The System log shows that “The TCP/IP NetBIOS Helper service entered the running state”. Concurrently, Event Code 4624: “An account was successfully logged on” appears for multiple machines within a short time frame. The logon type is identified as 3 (Network logon). Which of the following security incidents is the SIEM detecting?
A. A user connecting to shared files from multiple workstations B. A malware infection spreading via SMB protocol C. A network administrator conducting routine maintenance D. An attacker performing lateral movement within the network
Answer: D
Question #2 (Topic: Exam A)
A manufacturing company is deploying a SIEM system and wants to improve both its security monitoring and regulatory compliance capabilities. During the planning phase, the team decides to use an output-driven approach, starting with use cases that address unauthorized access to production control systems. They configure data sources and alert specific to this use case, ensuring they receive actionable alerts without excessive false positives. After validating its success, they move on to use cases related to supply chain disruptions and malware detection. Which of the following best describes the primary advantage of using an output-driven approach in SIEM deployment?
A. The company can collect logs from non-critical systems. B. The SOC team can respond to all incidents in real time without delays. C. The SIEM system can automatically block all unauthorized access attempts. D. The company can create more complex use cases with greater scope.
Answer: D
Question #3 (Topic: Exam A)
An attacker attempts to gain unauthorized access to a secure network by repeatedly guessing login credentials. The SIEM is configured to generate an alert after detecting 10 consecutive failed login attempts within a short timeframe. However, the attacker successfully logs in on the 9th attempt, just before the threshold is reached, bypassing the alert mechanism. Security teams only become aware of the incident after detecting suspicious activity post-login, highlighting a gap in the SIEM’s detection rules. What type of alert classification does this represent?
A. True Positive B. False Positive C. False Negative D. True Negative
Answer: C
Question #4 (Topic: Exam A)
Daniel Clark, a cybersecurity specialist working in the Cloud SOC for a government agency, is responsible for ensuring secure access to cloud applications while maintaining compliance with regulatory frameworks. His team needs a security solution that can enforce access policies to prevent unauthorized access to cloud based applications, monitor and restrict data sharing within SaaS, PaaS, and IaaS environments, ensure compliance with government regulations for data security and privacy, and apply security controls to prevent sensitive data exposure in the cloud. To achieve these objectives, the team has implemented a security technology that governs control over cloud resources, applies security policies, and protects sensitive cloud-stored data. Which Cloud SOC technology is Daniel’s team using?
A. Cloud Security Posture Management B. Cloud-native anomaly detection C. Cloud Workload Protection Platform D. Cloud Access Security Broker
Answer: D
Question #5 (Topic: Exam A)
A mid-sized healthcare organization is facing frequent phishing and ransomware attacks. They lack an internal SOC and want proactive threat detection and response capabilities. Compliance with HIPAA regulations is essential. The organization seeks a solution that includes both monitoring and rapid response to incidents. Which service best meets their needs?
A. MSSP with 24/7 log monitoring and incident escalation B. Self-hosted SIEM with in-house SOC analysts C. MDR with proactive threat hunting and incident containment D. Cloud-based SIEM with MSSP-Managed services
Answer: C
Download Exam
Page: 1 / 20
Total 100 questions