Which of the following is a Threat Intelligence Platform?
A. SolarWinds MS
B. TC Complete
C. Keepnote
D. Apility.io
Which of the following framework describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering?
A. COBIT
B. ITIL
C. SSE-CMM
D. SOC-CMM
What does Windows event ID 4740 indicate?
A. A user account was locked out.
B. A user account was disabled.
C. A user account was enabled.
D. A user account was created.
Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\'))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix. What does this event log indicate?
A. SQL Injection Attack
B. Parameter Tampering Attack
C. XSS Attack
D. Directory Traversal Attack
Which of the following are the responsibilities of SIEM Agents?
1.
Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.
2.
Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine.
3.
Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.
4.
Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.
A. 1 and 2
B. 2 and 3
C. 1 and 4
D. 3 and 1
Which of the following Windows event is logged every time when a user tries to access the "Registry" key?
A. 4656
B. 4663
C. 4660
D. 4657
Which of the following factors determine the choice of SIEM architecture?
A. SMTP Configuration
B. DHCP Configuration
C. DNS Configuration
D. Network Topology
What does HTTPS Status code 403 represents?
A. Unauthorized Error
B. Not Found Error
C. Internal Server Error
D. Forbidden Error
Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.
A. Failure Audit
B. Warning
C. Error
D. Information
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
A. De-Militarized Zone (DMZ)
B. Firewall
C. Honeypot
D. Intrusion Detection System
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-39 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.