312-39 Exam Question 1

John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.
Which of the following data source will he use to prepare the dashboard?
  • 312-39 Exam Question 2

    Which of the following fields in Windows logs defines the type of event occurred, such as Correlation Hint, Response Time, SQM, WDI Context, and so on?
  • 312-39 Exam Question 3

    John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.
    What does this event log indicate?
  • 312-39 Exam Question 4

    Which of the following tool can be used to filter web requests associated with the SQL Injection attack?
  • 312-39 Exam Question 5

    An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
    Original
    URL: http://www.buyonline.com/product.aspx?profile=12
    &debit=100
    Modified URL: http://www.buyonline.com/product.aspx?profile=12
    &debit=10
    Identify the attack depicted in the above scenario.