| Exam Name: | Certified SOC Analyst (CSA v2) | ||
| Exam Code: | 312-39 Dumps | ||
| Vendor: | ECCouncil | Certification: | CSA |
| Questions: | 200 Q&A's | Shared By: | tommy-lee |
Banter is a threat analyst in Christine Group of Industries. As a part ofthe job, he is currently formatting and structuring the raw data.
He is at which stage of the threat intelligence life cycle?
Mark Reynolds, a SOC analyst at a global financial institution, is working on the eradication phase after detecting phishing attacks targeting employees. To ensure attackers cannot reuse malicious infrastructure, Mark implements a technique that blocks known malicious IP addresses used for sending spam emails at the Domain Name System (DNS) level. Which technique is best suited?
Which of the following command is used to enable logging in iptables?