Which of the following Windows features is used to enable Security Auditing in Windows?
A. Bitlocker
B. Windows Firewall
C. Local Group Policy Editor
D. Windows Defender
Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?
A. threat_note
B. MagicTree
C. IntelMQ
D. Malstrom
An organization is implementing and deploying the SIEM with following capabilities.
What kind of SIEM deployment architecture the organization is planning to implement?
A. Cloud, MSSP Managed
B. Self-hosted, Jointly Managed C. Self-hosted, Self-Managed
D. Self-hosted, MSSP Managed
What is the process of monitoring and capturing all data packets passing through a given network using different tools?
A. Network Scanning
B. DNS Footprinting
C. Network Sniffing
D. Port Scanning
Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads. What does this indicate?
A. Concurrent VPN Connections Attempt
B. DNS Exfiltration Attempt
C. Covering Tracks Attempt
D. DHCP Starvation Attempt
Which of the following formula is used to calculate the EPS of the organization?
A. EPS = average number of correlated events / time in seconds
B. EPS = number of normalized events / time in seconds
C. EPS = number of security events / time in seconds
D. EPS = number of correlated events / time in seconds
Which of the following technique involves scanning the headers of IP packets leaving a network to make sure that the unauthorized or malicious traffic never leaves the internal network?
A. Egress Filtering
B. Throttling
C. Rate Limiting
D. Ingress Filtering
Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?
A. $ tailf /var/log/sys/kern.log
B. $ tailf /var/log/kern.log
C. # tailf /var/log/messages
D. # tailf /var/log/sys/messages
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very low and the impact of that attack is major?
A. High
B. Extreme
C. Low
D. Medium
The Syslog message severity levels are labelled from level 0 to level 7. What does level 0 indicate?
A. Alert
B. Notification
C. Emergency
D. Debugging
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-39 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.