| Exam Name: | Certified SOC Analyst (CSA v2) | ||
| Exam Code: | 312-39 Dumps | ||
| Vendor: | ECCouncil | Certification: | CSA |
| Questions: | 200 Q&A's | Shared By: | cassandra |
Sarah, a financial analyst at a multinational corporation, is suspected of leaking sensitive financial data to an unauthorized external party. The SOC team observed anomalous data transfer patterns originating from her account, flagged by the SIEM, indicating potential data exfiltration. The incident response team must contain the incident swiftly to minimize data loss and protect critical assets. As a SOC analyst, which should be prioritized as the initial containment measure?
A manufacturing company is deploying a SIEM system and uses an output-driven approach, starting with use cases addressing unauthorized access to production control systems. They configure data sources and alerts to ensure actionable alerts with low false positives, then expand to supply chain disruptions and malware detection. What is the primary advantage of an output-driven approach?
Mark Reynolds, a SOC analyst at a global financial institution, is working on the eradication phase after detecting phishing attacks targeting employees. To ensure attackers cannot reuse malicious infrastructure, Mark implements a technique that blocks known malicious IP addresses used for sending spam emails at the Domain Name System (DNS) level. Which technique is best suited?
Which attack works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?