Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ECCouncil 312-39 Certified SOC Analyst (CSA v2) Exam Practice Test

Page: 1 / 20
Total 200 questions

Certified SOC Analyst (CSA v2) Questions and Answers

Question 1

A Security Operations Center (SOC) analyst receives a high-priority alert indicating unusual user activity. An employee account is attempting to access company resources from a different country and outside of their normal working hours. This behavior raises concerns about potential account compromise or unauthorized access. To automate the initial response and quickly restrict access while further investigating the incident, which SOAR playbook would be relevant to adapt and implement?

Options:

A.

Alert Enrichment SOAR Playbook

B.

Deprovisioning Users SOAR Playbook

C.

Malware Containment SOAR Playbook

D.

Phishing Investigations SOAR Playbook

Question 2

A SOC analyst monitors network traffic to detect potential data exfiltration. The team uses a security solution that inspects data packets in real time as they traverse the network. During incident response, the solution struggles to analyze encrypted traffic, limiting effectiveness in identifying threats hidden within secure communications. Which security control, with this known limitation, is the SOC team relying on?

Options:

A.

VPN

B.

Packet filters

C.

SSH

D.

IPsec

Question 3

Bob is a SOC analyst in a multinational corporation that relies on a centralized file-sharing system for storing confidential project documents. One morning, he notices that a few critical financial records stored on the shared server appear to have been altered without authorization. Version history confirms unexpected changes made outside business hours. Bob must investigate by inspecting logs. Which log should he check to determine who accessed the files and when the modifications occurred?

Options:

A.

Security logs

B.

Authentication logs

C.

Firewall logs

D.

Network logs

Question 4

You are working at Tech Solutions, a global technology firm. Your team detects an adversary attempting to bypass authentication controls and escalate privileges within the enterprise network. To counter the threat, you implement credential encryption, behavioral analytics, and process isolation. Your approach follows a structured framework that systematically maps defensive techniques to known adversarial tactics, allowing you to anticipate and mitigate evolving cyber threats. Which framework did you choose to apply in this scenario?

Options:

A.

Systems Security Engineering CMM

B.

MITRE D3FEND Framework

C.

Cybersecurity Capability Maturity Model

D.

NIST Cybersecurity Framework 2.0

Question 5

Which of the following is a correct flow of the stages in an incident handling and response (IH&R) process?

Options:

A.

Containment –> Incident Recording –> Incident Triage –> Preparation –> Recovery –> Eradication –> Post-Incident Activities

B.

Preparation –> Incident Recording –> Incident Triage –> Containment –> Eradication –> Recovery –> Post-Incident Activities

C.

Incident Triage –> Eradication –> Containment –> Incident Recording –> Preparation –> Recovery –> Post-Incident Activities

D.

Incident Recording –> Preparation –> Containment –> Incident Triage –> Recovery –> Eradication –> Post-Incident Activities

Question 6

Which of the following threat intelligence is used by a SIEM for supplying the analysts with context and "situational awareness" by using threat actor TTPs, malwarecampaigns, tools used by threat actors.

1.Strategic threat intelligence

2.Tactical threat intelligence

3.Operational threat intelligence

4.Technical threat intelligence

Options:

A.

2 and 3

B.

1 and 3

C.

3 and 4

D.

1 and 2

Question 7

Mark Reynolds, a SOC analyst at a global financial institution, is working on the eradication phase after detecting phishing attacks targeting employees. To ensure attackers cannot reuse malicious infrastructure, Mark implements a technique that blocks known malicious IP addresses used for sending spam emails at the Domain Name System (DNS) level. Which technique is best suited?

Options:

A.

URL blacklisting on web proxies

B.

IP address blacklisting at the firewall

C.

DNS blackholing

D.

SMTP server filtering

Question 8

Which of the following are the responsibilities of SIEM Agents?

1.Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.

2.Normalizing data received fromvarious devices sending data to SIEM before forwarding it to the central engine.

3.Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.

4.Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.

Options:

A.

1 and 2

B.

2 and 3

C.

1 and 4

D.

3 and 1

Question 9

At 9:15 AM EST, Marcus Wong, a financial operations analyst, contacts the SOC after noticing Excel spreadsheets automatically encrypting with unusual file extensions (e.g., .locked or .crypt). The Tier 1 analyst logs the incident as ticket #INC-89271 in the SIEM and escalates it to a Tier 2 SOC analyst for investigation. Which phase of the Incident Response process is currently taking place?

Options:

A.

Containment

B.

Incident triage

C.

Incident recording and assignment

D.

Notification

Question 10

Which of the following attack can be eradicated by converting all non-alphanumeric characters to HTML character entities before displaying the user input in search engines and forums?

Options:

A.

Broken Access Control Attacks

B.

WebServices Attacks

C.

XSS Attacks

D.

Session Management Attacks

Question 11

Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.

Options:

A.

DoS Attack

B.

Man-In-Middle Attack

C.

Ransomware Attack

D.

Reconnaissance Attack

Question 12

A newly hired SOC analyst at a fast-growing multinational organization must quickly assess the company’s external exposure and identify potential security risks. Techniques considered include analyzing publicly available information, scanning exposed services, reviewing DNS records, and gathering external intelligence. Due to the scale across subsidiaries, cloud environments, and third-party integrations, some methods may not scale well and may lead to delays or incomplete insights. Which technique is less practical for handling large or diverse data sets in this scenario?

Options:

A.

DNS lookup

B.

Web enumeration

C.

OSINT

D.

Stack counting

Question 13

A government agency needs to monitor its network for unusual data exfiltration attempts. Traditional log data is insufficient to identify traffic anomalies, so the SIEM team integrates traffic flow data to detect large transfers and unexpected spikes. The team must choose the appropriate protocol to collect IP traffic information from routers and switches. Which protocol should be used?

Options:

A.

SNMP (Simple Network Management Protocol)

B.

NetFlow (RFC 3954)

C.

Syslog

D.

IPFIX (IP Flow Information Export)

Question 14

You are a Threat Hunter in an IT company’s security team working to enhance threat hunting capabilities. You observed that relying solely on traditional security alerts often results in missed detections of sophisticated threats. To strengthen your approach, you decide to incorporate multiple data sources, including external threat intelligence feeds, internal security logs, network traffic data, and endpoint telemetry. To efficiently process this vast amount of data, you implement a new tool that can aggregate, normalize, and correlate threat intelligence with internal telemetry to gain a more holistic understanding of emerging threats and enhance detection accuracy. What key threat detection capability is being leveraged in this scenario?

Options:

A.

Threat Reports

B.

Intelligence Buy-In

C.

Threat Trending

D.

Data Integration

Question 15

A SOC analyst receives an alert indicating that the system time on a critical Windows server was changed at 3:00 AM. There are no scheduled maintenance tasks at this time. Unauthorized time changes can be used to evade security controls, such as altering timestamps to obscure malicious activity. The analyst must identify the relevant event codes that log system time modifications and related suspicious behavior. Which of the following Windows Security Event Codes should the analyst review to investigate potential tampering?

Options:

A.

4608 and 4609

B.

4625 and 4634

C.

4616 and 4618

D.

4616 and 4624

Question 16

A SOC analyst is responsible for designing a security dashboard that provides real-time monitoring of security threats. The organization wants to avoid overwhelming analysts with excessive information and focus on the most critical security alerts to ensure timely responses to potential threats. Which principle should guide the design of the dashboard?

Options:

A.

Include as much data as possible to ensure complete visibility

B.

Restrict dashboard access to only network administrators

C.

Prioritize critical information and remove unnecessary details

D.

Use only historical data to avoid real-time inconsistencies

Question 17

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very low and the impact of that attack is major?

Options:

A.

High

B.

Extreme

C.

Low

D.

Medium

Question 18

A major financial institution has strict policies preventing unauthorized data transfers. As a SOC analyst, during routine log analysis you detect an anomaly: an employee workstation initiates large file transfers outside business hours, involving highly sensitive customer financial records. You discover remote access from an unfamiliar IP address and an unauthorized USB device connection on the workstation. Given the likelihood of data exfiltration, what should be your first step in responding?

Options:

A.

Isolate the employee’s workstation and revoke remote access

B.

Conduct a full forensic analysis first

C.

Disable the corporate VPN entirely

D.

Inform the employee’s department and wait for evidence

Question 19

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?

Options:

A.

Evidence Gathering

B.

Evidence Handling

C.

Eradication

D.

SystemsRecovery

Question 20

A financial institution's SIEM is generating a high number of false positives, causing alert fatigue among SOC analysts. To reduce this burden and improve threat detection accuracy, the organization integrates AI capabilities into the SIEM. After implementation, the SOC team observes a significant decrease in redundant alerts, along with faster detection of genuine threats. Which AI capability contributed to this improvement?

Options:

A.

Dynamic rule optimization

B.

Rule validation and testing

C.

Automated rule generation

D.

Data integration enhancement

Question 21

Which of the following threat intelligence helps cyber securityprofessionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Options:

A.

Analytical Threat Intelligence

B.

Operational Threat Intelligence

C.

Strategic Threat Intelligence

D.

Tactical Threat Intelligence

Question 22

A manufacturing company is deploying a SIEM system and wants to improve both security monitoring and regulatory compliance. During planning, the team uses an output-driven approach, starting with use cases that address unauthorized access to production control systems. They configure data sources and alerts specific to this use case, ensuring actionable alerts without excessive false positives. After validating success, they move on to use cases related to supply chain disruptions and malware detection. What is the primary advantage of using an output-driven approach in SIEM deployment?

Options:

A.

The company avoids the need to collect logs from non-critical systems.

B.

The SIEM system can automatically block all unauthorized access attempts.

C.

The company can create more complex use cases with greater scope.

D.

The SOC team can respond to all incidents in real time without delays.

Question 23

David is a SOC analyst in Karen Tech. One day an attack is initiated by the intruders but David was not able to find any suspicious events.

This type of incident is categorized into?

Options:

A.

True Positive Incidents

B.

False positive Incidents

C.

True Negative Incidents

D.

False Negative Incidents

Question 24

A threat hunter analyzing an infected endpoint finds that malicious processes keep reappearing even after termination, making traditional remediation ineffective. The user reports slowdowns, abnormal pop-ups, and unauthorized application launches. Deeper inspection reveals multiple scheduled tasks executing unknown scripts at intervals, along with suspicious registry modifications enabling automatic execution on startup. The endpoint makes intermittent encrypted outbound connections to an unclassified external server. The organization also observed multiple failed privileged logins from the same subnet. Which signs should the threat hunter look for to confirm and mitigate the threat?

Options:

A.

Network-based artifacts

B.

Threat intelligence and adversary context

C.

Host-based artifacts

D.

Indicators of Attack (IoAs)

Question 25

SecureTech Inc. operates critical infrastructure and applications in AWS. The SOC detects suspicious activities such as unexpected API calls, unusual outbound traffic from instances, and DNS requests to potentially malicious domains. They need a fully managed AWS security service that continuously monitors for malicious activity, analyzes CloudTrail logs, VPC Flow Logs, and DNS query logs, leverages machine learning and threat intelligence, and provides actionable findings. Which AWS service best fits?

Options:

A.

Amazon Macie

B.

AWS Config

C.

AWS Security Hub

D.

Amazon GuardDuty

Question 26

A SOC team at a major financial institution detects unauthorized access attempts on its web application. Logs indicate the web application is compromised. To determine the exact attack technique and implement mitigation, forensic investigators assess cookie attributes (such as HttpOnly, Secure, and SameSite) for security weaknesses and track anomalous request patterns that deviate from normal user behavior. Which attack vector is the forensic team investigating?

Options:

A.

Session poisoning

B.

Man-in-the-middle (MITM) attack

C.

Cross-site scripting (XSS)

D.

SQL injection

Question 27

Which of the following technique involves scanning the headers of IP packets leaving a network to make sure

thatthe unauthorized or malicious traffic never leaves the internal network?

Options:

A.

Egress Filtering

B.

Throttling

C.

Rate Limiting

D.

Ingress Filtering

Question 28

Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

Options:

A.

Unicode Encoding

B.

UTF Encoding

C.

Base64 Encoding

D.

URL Encoding

Question 29

Sarah Chen works as a security analyst at Midwest Financial. At 2:00 AM, the SOC detects unusual data exfiltration patterns and evidence of lateral movement across multiple servers containing sensitive customer data. The activity appears sophisticated and may require forensic analysis and system restoration. Which team should take primary responsibility for managing this complex security incident?

Options:

A.

Threat intelligence team

B.

Incident response team (IRT)

C.

Security engineering team

D.

SOC team

Question 30

A multinational financial institution notices unusual network activity during a routine security audit. The SOC detects multiple failed login attempts, followed by a successful access attempt using an administrator's credentials from an unrecognized IP address. Shortly after, sensitive customer records are accessed without authorization. The company suspects a breach and calls in the forensic investigation team. During evidence collection, the forensic team creates a detailed record that tracks every individual who handled the evidence, its storage location, and timestamps of transfers. What is this process called?

Options:

A.

Chain of Custody

B.

Incident Documentation

C.

Data Imaging

D.

Digital Fingerprinting

Question 31

At 10:30 AM, during routine monitoring, Tier 1 SOC analyst Jennifer detects unusual network traffic and confirms an active LockBit ransomware infection targeting systems in the finance department. She escalates to the SOC lead, Sarah, who activates the Incident Response Team (IRT) and instructs the network team to isolate the finance department’s VLAN to prevent further spread across the network. Which phase of the Incident Response process is currently being implemented?

Options:

A.

Evidence gathering and forensic analysis

B.

Eradication

C.

Notification

D.

Containment

Question 32

Which of the following attack inundates DHCP servers with fake DHCP requests toexhaust all available IP addresses?

Options:

A.

DHCP Starvation Attacks

B.

DHCP Spoofing Attack

C.

DHCP Port Stealing

D.

DHCP Cache Poisoning

Question 33

The Security Operations Center (SOC) team is investigating a suspected malware incident during the Analysis Phase of their incident response process. Their primary goal is to validate the initial detection, ensure the threat is real, and gather critical intelligence to understand the scope of the attack. Which action should the SOC team take to confirm initial findings and eliminate false alarms?

Options:

A.

Verify generated logs

B.

Verify false positives

C.

Scan the enterprise environment and update the scope

D.

Root-cause analysis

Question 34

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.

Options:

A.

rule-based

B.

pull-based

C.

push-based

D.

signature-based

Question 35

What does [-n] in the following checkpoint firewall log syntax represents?

fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]

Options:

A.

Speed up the process by not performing IP addresses DNS resolution in the Log files

B.

Display both the date and the time for each log record

C.

Display account log records only

D.

Display detailed log chains (all the log segments a log record consists of)

Question 36

You are working as a SOC analyst for a cloud-based service provider that relies on PostgreSQL databases to store critical customer data. During a security review, you discover that logs are not being generated for failed authentication attempts, slow queries, or database errors. This lack of visibility is making it difficult to detect threats and investigate suspicious activity. To ensure PostgreSQL captures and stores logs for centralized monitoring and forensic analysis, which configuration parameter should you enable?

Options:

A.

logging-collector

B.

log_collector

C.

loggingcollector

D.

logging-collector (with space)

Question 37

If the SIEM generates the following four alerts at the same time:

I.Firewall blocking traffic fromgetting into the network alerts

II.SQL injection attempt alerts

III.Data deletion attempt alerts

IV.Brute-force attempt alerts

Which alert should be given least priority as per effective alert triaging?

Options:

A.

III

B.

IV

C.

II

D.

I

Question 38

As a SOC Administrator at a mid-sized financial institution, you noticed intermittent network slowdowns and unexplained high memory usage across multiple critical systems. Your initial analysis found no traces of malware, but a forensic investigation revealed unauthorized scheduled tasks that executed during off-peak hours. These tasks ran obfuscated scripts that connected to an external command-and-control (C2) server. Further investigations showed that the adversary had gained access months ago through a compromised VPN account, leveraging stolen credentials from a phishing campaign. Which phase of the Advanced Persistent Threat (APT) lifecycle does this scenario align with?

Options:

A.

Cleanup

B.

Initial Intrusion

C.

Search and Exfiltration

D.

Persistence

Question 39

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

Options:

A.

Nmap

B.

UrlScan

C.

ZAP proxy

D.

Hydra

Question 40

Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to find the purpose and scope of the planned incident response capabilities.

What is he looking for?

Options:

A.

Incident Response Intelligence

B.

Incident Response Mission

C.

Incident Response Vision

D.

Incident Response Resources

Question 41

A multinational corporation with strict regulatory requirements (e.g., GDPR, PCI-DSS) needs a SIEM solution to monitor its global network. Data residency laws in certain regions prohibit transferring logs outside local jurisdictions. The company also requires centralized monitoring with 24/7 SOC operations but has limited in-house SIEM expertise. Which SIEM deployment model is appropriate?

Options:

A.

Self-hosted, jointly managed

B.

Hybrid model, jointly managed

C.

Self-hosted, MSSP-managed

D.

Cloud, MSSP-managed

Question 42

Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.

What Chloe is looking at?

Options:

A.

Error log

B.

System boot log

C.

General message and system-related stuff

D.

Login records

Question 43

A SOC team is implementing a threat intelligence strategy to proactively defend against threats. The CISO emphasizes that collecting data is not enough; the team must allocate personnel, tools, and time to gather intelligence aligned with key concerns (fraud, phishing, nation-state threats). They must determine who will collect intelligence, which sources will be monitored, and how frequently collection occurs. What is this process called?

Options:

A.

Resources

B.

Tasking

C.

High-level requirements

D.

Prioritization

Question 44

What is the correct sequence of SOC Workflow?

Options:

A.

Collect, Ingest, Validate, Document, Report, Respond

B.

Collect, Ingest, Document, Validate, Report, Respond

C.

Collect, Respond, Validate, Ingest, Report,Document

D.

Collect, Ingest, Validate, Report, Respond, Document

Question 45

Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?

Options:

A.

FISMA

B.

HIPAA

C.

PCI-DSS

D.

DARPA

Question 46

Emmanuel is working as a SOC analyst in a company named Tobey Tech. The manager of Tobey Tech recently recruited an Incident Response Team (IRT) for his company. In the process of collaboration with the IRT, Emmanueljust escalated an incident to the IRT.

What is the first step that the IRT will do to the incident escalated by Emmanuel?

Options:

A.

Incident Analysis and Validation

B.

Incident Recording

C.

Incident Classification

D.

Incident Prioritization

Question 47

The SOC team is tasked with enhancing the security of an organization's network infrastructure. The organization's public-facing web servers, which handle customer transactions, need to be isolated from the internal private network containing sensitive employee data and proprietary systems. The goal is to create a buffer zone that limits exposure of internal systems if the web servers are compromised during a cyberattack, such as a DDoS or SQL injection attempt. As a SOC analyst, which network architecture component would you recommend implementing to establish this isolated region?

Options:

A.

Demilitarized Zone (DMZ)

B.

Intrusion Detection System (IDS)

C.

Firewall

D.

Honeypot

Question 48

Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?

Options:

A.

/etc/ossim/reputation

B.

/etc/ossim/siem/server/reputation/data

C.

/etc/siem/ossim/server/reputation.data

D.

/etc/ossim/server/reputation.data

Question 49

A security team is configuring a newly deployed SIEM system. With limited resources, they must prioritize monitoring scenarios that provide the greatest security benefit. The team understands an effective SIEM relies on well-defined use cases tailored to the organization’s environment. Which factor should guide their selection of use cases?

Options:

A.

Select use cases based on the availability and quality of data from existing data sources

B.

Prioritize use cases that address zero-day attacks

C.

Implement as many use cases as the SIEM supports to cover all threats

D.

Focus on use cases required to meet industry compliance standards

Question 50

In a large corporation, the HR department receives an urgent email from someone impersonating a high-level executive, requesting immediate transfer of sensitive employee data. The email includes an official-looking document and a phone number for verification. Feeling pressured, the HR manager calls the number and “confirms” the request, then transfers the data. Investigation later confirms the email was fraudulent and the executive had no knowledge of the request. What type of attack did the HR department face?

Options:

A.

Credential theft

B.

Web-based intrusion

C.

Social engineering attack

D.

Application exploit

Question 51

What does the HTTP status codes 1XX represents?

Options:

A.

Informational message

B.

Client error

C.

Success

D.

Redirection

Question 52

You are working as a SOC analyst in a multinational company with multiple data centers and remote offices. Security logs are stored locally at each site, making it difficult to correlate incidents across different locations. Recently, an advanced persistent threat (APT) compromised multiple servers, but due to multiple sources of logs and inconsistent monitoring, the attack was detected only after significant data exfiltration. To improve visibility, streamline log analysis, and enable faster incident response, you need to implement a solution that aggregates logs from all sources into a unified system. Which solution will you implement?

Options:

A.

Centralized logging

B.

Event tracing

C.

Distributed logging

D.

Local logging

Question 53

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the 'show logging' command to get the required output?

Options:

A.

show logging | access 210

B.

show logging | forward 210

C.

show logging | include 210

D.

show logging | route 210

Question 54

A type of threatintelligent that find out the information about the attacker by misleading them is known as

.

Options:

A.

Threat trending Intelligence

B.

Detection Threat Intelligence

C.

Operational Intelligence

D.

Counter Intelligence

Question 55

A health corporation is implementing a SIEM solution to improve detection and response and comply with HIPAA requirements. They need the SIEM to efficiently collect, analyze, and correlate security events from network devices, servers, and security applications, and generate timely alerts for potential HIPAA violations. Which capability is needed to meet these needs?

Options:

A.

Threat hunting and intelligence

B.

Centralized SIEM implementation

C.

Log management and security analytics

D.

Log collection through agents

Question 56

The SOC team is investigating a phishing attack that targeted multiple employees. During the Containment Phase, they need to determine how users interacted with the malicious email: whether they opened it, clicked links, downloaded attachments, or entered credentials. This information is critical to assessing impact and preventing further compromise. Which specific activity helps the SOC team understand user interactions with the phishing email?

Options:

A.

Monitoring and containment validation

B.

Malware infection check

C.

User action verification

D.

Blocking command-and-control (C2) and email traffic

Question 57

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.

What kind of threat intelligence described above?

Options:

A.

Tactical Threat Intelligence

B.

Strategic Threat Intelligence

C.

Functional Threat Intelligence

D.

Operational Threat Intelligence

Question 58

Daniel Clark is a cybersecurity specialist in the Cloud SOC for a government agency. His team needs a security solution that can enforce access policies to prevent unauthorized access to cloud-based applications, monitor and restrict data sharing within SaaS, PaaS, and IaaS environments, ensure compliance with government regulations for data security and privacy, and apply security controls to prevent sensitive data exposure in the cloud. Which Cloud SOC technology is his team using?

Options:

A.

Cloud Access Security Broker (CASB)

B.

Cloud Security Posture Management (CSPM)

C.

Cloud Workload Protection Platform (CWPP)

D.

Cloud-native anomaly detection

Question 59

Sarah Chen is a Level 1 SOC analyst at Centex Healthcare. The SOC detected a potential data breach involving unauthorized access to patient records. Multiple departments need constant updates: Legal needs HIPAA compliance implications, HR needs to coordinate staff training responses, and the MSSP requires technical details to assist containment. Which role serves as the central point of communication between these stakeholders?

Options:

A.

Incident coordinator

B.

Public relations manager

C.

Incident manager

D.

Information security officer

Question 60

John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.

Which of the following types of threat intelligence did he use?

Options:

A.

Strategic Threat Intelligence

B.

Technical ThreatIntelligence

C.

Tactical Threat Intelligence

D.

Operational Threat Intelligence

Page: 1 / 20
Total 200 questions