Free Eccouncil 312-39 Exam Actual Questions

The questions for 312-39 were last updated On Nov 17, 2024

Question No. 1

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.

What kind of threat intelligence described above?

Show Answer Hide Answer
Correct Answer: B

Question No. 2

Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.

What filter should Peter add to the 'show logging' command to get the required output?

Show Answer Hide Answer
Correct Answer: C

Question No. 3

Which of the following technique involves scanning the headers of IP packets leaving a network to make sure

that the unauthorized or malicious traffic never leaves the internal network?

Show Answer Hide Answer
Correct Answer: A

Question No. 4

What does [-n] in the following checkpoint firewall log syntax represents?

fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]

Show Answer Hide Answer
Correct Answer: A

Question No. 5

Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?

Show Answer Hide Answer
Correct Answer: B