Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

312-39 Certified SOC Analyst (CSA v2) Questions and Answers

Questions 4

Which of the following service provides phishing protection and content filtering to manage the Internet experience on and off your network with the acceptable use or compliance policies?

Options:

A.

Apility.io

B.

Malstrom

C.

OpenDNS

D.

I-Blocklist

Buy Now
Questions 5

A government agency needs to monitor its network for unusual data exfiltration attempts. Traditional log data is insufficient to identify traffic anomalies, so the SIEM team integrates traffic flow data to detect large transfers and unexpected spikes. The team must choose the appropriate protocol to collect IP traffic information from routers and switches. Which protocol should be used?

Options:

A.

SNMP (Simple Network Management Protocol)

B.

NetFlow (RFC 3954)

C.

Syslog

D.

IPFIX (IP Flow Information Export)

Buy Now
Questions 6

Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?

Options:

A.

Windows Event Log

B.

Web Server Logs

C.

Router Logs

D.

Switch Logs

Buy Now
Questions 7

A SOC analyst monitors network traffic to detect potential data exfiltration. The team uses a security solution that inspects data packets in real time as they traverse the network. During incident response, the solution struggles to analyze encrypted traffic, limiting effectiveness in identifying threats hidden within secure communications. Which security control, with this known limitation, is the SOC team relying on?

Options:

A.

VPN

B.

Packet filters

C.

SSH

D.

IPsec

Buy Now
Questions 8

John, SOC analyst wants to monitor the attempt of process creation activities from any of their Windows endpoints.

Which of following Splunk query will help him to fetch related logs associated with process creation?

Options:

A.

index=windows LogName=Security EventCode=4678 NOT (Account_Name=*$) .. .. ... ..

B.

index=windows LogName=Security EventCode=4688 NOT (Account_Name=*$) .. .. ..

C.

index=windows LogName=Security EventCode=3688 NOT (Account_Name=*$) .. .. ..

D.

index=windows LogName=Security EventCode=5688 NOT (Account_Name=*$) ... ... ...

Buy Now
Questions 9

Katie is a SOC analyst at an international financial corporation. Her team needs functionality so the system continuously scans logs for anomalies, identifies suspicious activities, notifies analysts when predefined security thresholds are reached, and generates incidents or tickets to ensure immediate response. It must provide details such as event type, duration, affected device, and OS version. Which function should she configure to achieve this?

Options:

A.

Log collection

B.

Alerting and reporting

C.

Log normalization

D.

Log parsing

Buy Now
Questions 10

Daniel Clark is a cybersecurity specialist in the Cloud SOC for a government agency. His team needs a security solution that can enforce access policies to prevent unauthorized access to cloud-based applications, monitor and restrict data sharing within SaaS, PaaS, and IaaS environments, ensure compliance with government regulations for data security and privacy, and apply security controls to prevent sensitive data exposure in the cloud. Which Cloud SOC technology is his team using?

Options:

A.

Cloud Access Security Broker (CASB)

B.

Cloud Security Posture Management (CSPM)

C.

Cloud Workload Protection Platform (CWPP)

D.

Cloud-native anomaly detection

Buy Now
Questions 11

Identify the HTTP status codes that represents the server error.

Options:

A.

2XX

B.

4XX

C.

1XX

D.

5XX

Buy Now
Questions 12

Jennifer, a SOC analyst, initiates an investigation after receiving an alert about potential unauthorized activity on Marcus's workstation. She starts by retrieving EDR logs from the endpoint, analyzing network traffic patterns in the Security Information and Event Management (SIEM) system, and inspecting email gateway logs for signs of malicious attachments. Her objective is to determine whether this alert represents a legitimate security incident. In which phase of the Incident Response process is Jennifer currently operating?

Options:

A.

Incident Triage

B.

Evidence Gathering and Forensic Analysis

C.

Notification

D.

Incident Recording and Assignment

Buy Now
Questions 13

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs.

What does these TTPs refer to?

Options:

A.

Tactics, Techniques, and Procedures

B.

Tactics, Threats, and Procedures

C.

Targets, Threats, and Process

D.

Tactics, Targets, and Process

Buy Now
Questions 14

A financial services company hosts an online banking platform accessible via a public web portal. The SOC team has deployed Snort IDS to monitor HTTP traffic for potential attacks targeting the login page. One day, a user attempts to log in multiple times, generating a series of failed authentication events. During this time, Snort IDS triggers an alert based on the following rule:

alert tcp any any -> any 80 (msg:"SQL Injection attempt detected"; content:"' OR T=T"; nocase; sid:1000001; rev:1;)

The alert indicates that an incoming HTTP request contained the classic SQL injection payload ' OR T=T, which is commonly used to bypass login authentication by always evaluating to true. The SIEM, integrated with Snort, receives this alert and correlates it with multiple failed login attempts from the same source IP. This triggers an automated response, temporarily blocking the suspicious IP address and notifying the SOC team. Which detection method is used by this rule?

Options:

A.

Behavioral-based detection

B.

Signature-based detection

C.

Anomaly-based detection

D.

Statistical-based detection

Buy Now
Questions 15

If the SIEM generates the following four alerts at the same time:

I.Firewall blocking traffic fromgetting into the network alerts

II.SQL injection attempt alerts

III.Data deletion attempt alerts

IV.Brute-force attempt alerts

Which alert should be given least priority as per effective alert triaging?

Options:

A.

III

B.

IV

C.

II

D.

I

Buy Now
Questions 16

Which of the following Windows features is used to enable Security Auditing in Windows?

Options:

A.

Bitlocker

B.

Windows Firewall

C.

Local Group Policy Editor

D.

Windows Defender

Buy Now
Questions 17

Which of the following Windows event is logged every time when a user tries to access the "Registry" key?

Options:

A.

4656

B.

4663

C.

4660

D.

4657

Buy Now
Questions 18

The SOC team at GlobalTech has finished patching a critical vulnerability exploited during a ransomware attack. The team is now restoring 2.3 TB of encrypted data from their Veeam backup system, rebuilding 23 compromised workstations identified through SIEM logs, and re-enabling network access for the finance department after validating systems are clean. Which Incident Response phase is this?

Options:

A.

Post-incident activities

B.

Containment

C.

Eradication

D.

Recovery

Buy Now
Questions 19

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.

Identify the stage in which he is currently in.

Options:

A.

Post-Incident Activities

B.

Incident Recording and Assignment

C.

Incident Triage

D.

Incident Disclosure

Buy Now
Questions 20

Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords and their corresponding hash values to crack the password.

Options:

A.

Dictionary Attack

B.

Rainbow Table Attack

C.

Bruteforce Attack

D.

Syllable Attack

Buy Now
Questions 21

Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?

Options:

A.

Rate Limiting

B.

Egress Filtering

C.

Ingress Filtering

D.

Throttling

Buy Now
Questions 22

A security team is designing SIEM use-case logic to detect privilege escalation attempts on Windows servers. They have already identified and validated the necessary event sources (e.g., Active Directory logs, Windows Security logs). What should be their next step in the use case logic development process?

Options:

A.

Define response actions for detected incidents before writing the rules

B.

Define correlation rules and conditions that detect specific privilege escalation patterns

C.

Implement and test the use case immediately in the production SIEM environment

D.

Collect historical security logs to confirm the use case is necessary

Buy Now
Questions 23

According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?

NOTE: It is mandatory to answer the question before proceeding to the next one.

Options:

A.

High

B.

Extreme

C.

Low

D.

Medium

Buy Now
Questions 24

A large financial organization has experienced an increase in sophisticated cyber threats, including zero-day attacks and APTs. Traditional detection relies heavily on signatures and manual intervention, causing delays. The CISO is exploring AI-driven solutions that can automatically analyze large datasets, detect anomalies, and adapt to evolving threats in real time—identifying suspicious activity without predefined signatures and with minimal human oversight. Which key AI technology should the organization focus on?

Options:

A.

Static IP blocking

B.

Machine learning (ML)

C.

Natural language processing (NLP)

D.

Heuristic-based signature detection

Buy Now
Questions 25

The SOC team at a national cybersecurity agency detects anomalous network traffic from a sensitive government server and escalates to forensics. The forensic team discovers a trojan suspected of data exfiltration and persistence. The lead malware analyst must determine capabilities and persistence mechanisms by analyzing the trojan’s binary code at the instruction level without executing it. Which technique should the analyst use?

Options:

A.

Malware disassembly

B.

Network behavior monitoring

C.

Dynamic code injection

D.

Interactive debugging

Buy Now
Questions 26

Which of the following are the responsibilities of SIEM Agents?

1.Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.

2.Normalizing data received fromvarious devices sending data to SIEM before forwarding it to the central engine.

3.Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.

4.Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.

Options:

A.

1 and 2

B.

2 and 3

C.

1 and 4

D.

3 and 1

Buy Now
Questions 27

John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.

What does this event log indicate?

Options:

A.

XSS Attack

B.

SQLinjection Attack

C.

Directory Traversal Attack

D.

Parameter Tampering Attack

Buy Now
Questions 28

A SOC analyst receives an alert indicating that the system time on a critical Windows server was changed at 3:00 AM. There are no scheduled maintenance tasks at this time. Unauthorized time changes can be used to evade security controls, such as altering timestamps to obscure malicious activity. The analyst must identify the relevant event codes that log system time modifications and related suspicious behavior. Which of the following Windows Security Event Codes should the analyst review to investigate potential tampering?

Options:

A.

4608 and 4609

B.

4625 and 4634

C.

4616 and 4618

D.

4616 and 4624

Buy Now
Questions 29

A major financial institution has strict policies preventing unauthorized data transfers. As a SOC analyst, during routine log analysis you detect an anomaly: an employee workstation initiates large file transfers outside business hours, involving highly sensitive customer financial records. You discover remote access from an unfamiliar IP address and an unauthorized USB device connection on the workstation. Given the likelihood of data exfiltration, what should be your first step in responding?

Options:

A.

Isolate the employee’s workstation and revoke remote access

B.

Conduct a full forensic analysis first

C.

Disable the corporate VPN entirely

D.

Inform the employee’s department and wait for evidence

Buy Now
Questions 30

Global Solutions Inc. uses syslog for centralized logging across a geographically diverse network. The SOC team must ensure logs are reliably delivered from remote sites to the central logging server across potentially unreliable network connections. To guarantee consistent and dependable log delivery, which syslog architectural layer should they focus on optimizing and hardening?

Options:

A.

Syslog application layer

B.

Syslog management and filtering

C.

Syslog content layer

D.

Syslog transport layer

Buy Now
Questions 31

At a large healthcare organization, the Security Operations Center (SOC) detects a surge of failed login attempts on employee accounts, indicating a possible brute-force attack. To contain the threat, the team quickly takes action to prevent unauthorized access. However, they also need to implement a security measure that strengthens account protection beyond just stopping the current attack, reducing the risk of similar incidents in the future. During the Containment Phase, which action would best enhance long-term account security against brute-force attacks?

Options:

A.

Notify affected users

B.

Block IP addresses and enforce account lockout policies

C.

Cross-verify false positives

D.

Enable multi-factor authentication (MFA)

Buy Now
Questions 32

You are a SOC analyst on duty during a high-severity incident involving a DDoS attack targeting your organization’s e-commerce platform. The attack disrupts online transactions. Using SIEM tools and packet capture systems, you identify unusual traffic patterns and trace activity back to command-and-control (C2) servers directing a botnet. Your goal is to recommend an eradication strategy that will sever the attackers’ control over infected devices and halt the attack. Which strategy should your team implement?

Options:

A.

Rate limiting

B.

Neutralizing handlers

C.

Blocking potential attacks

D.

Disabling botnets

Buy Now
Questions 33

Which attack works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

Options:

A.

Hybrid Attack

B.

Bruteforce Attack

C.

Rainbow Table Attack

D.

Birthday Attack

Buy Now
Questions 34

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.

What kind of threat intelligence described above?

Options:

A.

Tactical Threat Intelligence

B.

Strategic Threat Intelligence

C.

Functional Threat Intelligence

D.

Operational Threat Intelligence

Buy Now
Questions 35

A healthcare organization's SIEM detects unusual HTTP requests targeting its patient portal. The requests originate from a foreign IP address and occur during non-business hours. The methods used are primarily TRACE and OPTIONS, which are rarely seen in normal web traffic. The SIEM correlates these with increased reconnaissance activity on other servers within the same subnet. What is the primary security concern with TRACE and OPTIONS requests?

Options:

A.

They expose information about server-supported methods and request headers

B.

They can be used to upload malicious payloads directly to the server

C.

They make Distributed Denial of Service (DDoS) attacks easier

D.

They allow attackers to bypass authentication controls

Buy Now
Questions 36

David Reynolds, a SOC analyst at a healthcare organization, is investigating suspicious login attempts flagged by the SIEM. To mitigate brute-force risk on targeted endpoints, he collaborates with IT to implement an automatic account lockout policy that temporarily disables accounts after multiple failed login attempts. Within the SOC’s eradication strategy, which category of measures does this action align with?

Options:

A.

Physical security measures

B.

Network security measures

C.

Host security measures

D.

Authentication and authorization measures

Buy Now
Questions 37

David is a SOC analyst responsible for monitoring critical infrastructure. He detects unauthorized applications running on a high-privilege Windows server accessible only by a restricted set of users. The applications were not part of approved deployments, and installations occurred outside business hours. Logs indicate potential system configuration changes around the same timeframe. Which log should he examine to determine when and how these installations occurred?

Options:

A.

Security event log

B.

System event log

C.

Setup event log

D.

Application event log

Buy Now
Questions 38

Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?

Options:

A.

FISMA

B.

HIPAA

C.

PCI-DSS

D.

DARPA

Buy Now
Questions 39

Identify the attack in which the attacker exploits a target system through publicly known but still unpatched vulnerabilities.

Options:

A.

Slow DoS Attack

B.

DHCP Starvation

C.

Zero-Day Attack

D.

DNS Poisoning Attack

Buy Now
Questions 40

Which of the following technique involves scanning the headers of IP packets leaving a network to make sure

thatthe unauthorized or malicious traffic never leaves the internal network?

Options:

A.

Egress Filtering

B.

Throttling

C.

Rate Limiting

D.

Ingress Filtering

Buy Now
Questions 41

A leading e-commerce company relies on backend servers for processing customer transactions. You are working with their cybersecurity team as a SOC analyst. One morning, you notice a sharp increase in CPU utilization on one of your backend servers. Your team scans and monitors the server and finds that an unknown process is running, consuming excessive resources. You further perform detailed forensic analysis and identify the presence of an unrecognized scheduled task that triggers a PowerShell script connecting to an unknown IP address. What should you do to confirm whether this is an active attack?

Options:

A.

Analyze the network logs to identify external connections

B.

Check file integrity and detect recent unauthorized changes

C.

Analyze the system logs for unauthorized changes

D.

Review user access logs for unauthorized activity

Buy Now
Questions 42

The Security Operations Center (SOC) team at Rapid Response Group, a leading cybersecurity firm, is facing challenges in managing security incidents efficiently. With an increasing volume of alerts and security events being generated daily in their Microsoft Sentinel environment, the team is struggling to respond to threats quickly and consistently. To enhance their incident response capabilities, they aim to automate routine security tasks, such as log collection, alert triaging, remediation steps, and notifications to stakeholders. By implementing automated workflows, they seek to reduce response times, eliminate manual intervention for repetitive actions, and ensure a standardized approach to handling security threats across the organization. Which component of Microsoft Sentinel should they utilize to create these automated workflows for incident response?

Options:

A.

Community

B.

Playbooks

C.

Workspace

D.

Analytics

Buy Now
Questions 43

As a SOC Administrator at a mid-sized financial institution, you noticed intermittent network slowdowns and unexplained high memory usage across multiple critical systems. Your initial analysis found no traces of malware, but a forensic investigation revealed unauthorized scheduled tasks that executed during off-peak hours. These tasks ran obfuscated scripts that connected to an external command-and-control (C2) server. Further investigations showed that the adversary had gained access months ago through a compromised VPN account, leveraging stolen credentials from a phishing campaign. Which phase of the Advanced Persistent Threat (APT) lifecycle does this scenario align with?

Options:

A.

Cleanup

B.

Initial Intrusion

C.

Search and Exfiltration

D.

Persistence

Buy Now
Questions 44

SecureTech Inc. operates critical infrastructure and applications in AWS. The SOC detects suspicious activities such as unexpected API calls, unusual outbound traffic from instances, and DNS requests to potentially malicious domains. They need a fully managed AWS security service that continuously monitors for malicious activity, analyzes CloudTrail logs, VPC Flow Logs, and DNS query logs, leverages machine learning and threat intelligence, and provides actionable findings. Which AWS service best fits?

Options:

A.

Amazon Macie

B.

AWS Config

C.

AWS Security Hub

D.

Amazon GuardDuty

Buy Now
Questions 45

The SOC team found a suspicious document file on a user's workstation. Upon initial inspection, the document appears benign, but deeper analysis reveals an embedded PowerShell script. The team suspects the script is designed to download and execute a malicious payload. They need to understand the script's functionality without triggering it. Which malware analysis technique is recommended to understand the PowerShell script's functionality without executing it?

Options:

A.

Static analysis

B.

Dynamic analysis

C.

Automated behavioral analysis

D.

Network traffic analysis

Buy Now
Questions 46

Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.

What does this event log indicate?

Options:

A.

Directory Traversal Attack

B.

Parameter Tampering Attack

C.

XSS Attack

D.

SQL Injection Attack

Buy Now
Questions 47

A multinational financial institution notices unusual network activity during a routine security audit. The SOC detects multiple failed login attempts, followed by a successful access attempt using an administrator's credentials from an unrecognized IP address. Shortly after, sensitive customer records are accessed without authorization. The company suspects a breach and calls in the forensic investigation team. During evidence collection, the forensic team creates a detailed record that tracks every individual who handled the evidence, its storage location, and timestamps of transfers. What is this process called?

Options:

A.

Chain of Custody

B.

Incident Documentation

C.

Data Imaging

D.

Digital Fingerprinting

Buy Now
Questions 48

Which of the following threat intelligence helps cyber securityprofessionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Options:

A.

Analytical Threat Intelligence

B.

Operational Threat Intelligence

C.

Strategic Threat Intelligence

D.

Tactical Threat Intelligence

Buy Now
Questions 49

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

Options:

A.

Nmap

B.

UrlScan

C.

ZAP proxy

D.

Hydra

Buy Now
Questions 50

Which of the following formula represents the risk?

Options:

A.

Risk = Likelihood × Severity × Asset Value

B.

Risk = Likelihood × Consequence × Severity

C.

Risk = Likelihood × Impact × Severity

D.

Risk = Likelihood × Impact × Asset Value

Buy Now
Questions 51

A financial services company implements a SIEM solution to enhance cybersecurity. Despite deployment, it fails to detect known attacks or suspicious activities. Although reports are generated, the team struggles to interpret them. Investigation shows that critical logs from firewalls, IDS, and endpoint devices are not reaching the SIEM. What is the reason the SIEM is not functioning as expected?

Options:

A.

Improper configuration or design of the SIEM deployment architecture

B.

Lack of understanding of SIEM features and capabilities

C.

Difficulty handling the volume of collected log data

D.

Delays in log collection and analysis due to system performance issues

Buy Now
Questions 52

You are part of a team of SOC analysts in a multinational organization that processes large volumes of security logs from various sources, including firewalls, IDS, and authentication servers. Your team is having difficulty detecting incidents because logs from different systems are analyzed in isolation, making it harder to link related events. What approach should you implement for future investigations to automatically match related log events based on predefined rules?

Options:

A.

Log normalization

B.

Log collection

C.

Log correlation

D.

Log transformation

Buy Now
Questions 53

Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.

Options:

A.

Failure Audit

B.

Warning

C.

Error

D.

Information

Buy Now
Questions 54

Sarah Chen works as a security analyst at Midwest Financial. At 2:00 AM, the SOC detects unusual data exfiltration patterns and evidence of lateral movement across multiple servers containing sensitive customer data. The activity appears sophisticated and may require forensic analysis and system restoration. Which team should take primary responsibility for managing this complex security incident?

Options:

A.

Threat intelligence team

B.

Incident response team (IRT)

C.

Security engineering team

D.

SOC team

Buy Now
Questions 55

One week after a ransomware attack disrupted operations, Sarah, a SOC analyst, leads a review meeting with the IT team, security engineers, and business unit representatives. The group reviews the incident timeline, calculates a business impact of $157,000 due to downtime and data loss, and identifies seven critical improvements to enhance detection and response processes. Which of the following Incident Response phase is this?

Options:

A.

Recovery

B.

Post-Incident Activities

C.

Eradication

D.

Containment

Buy Now
Questions 56

NationalHealth, a government agency responsible for managing sensitive patient health records, is subject to strict data sovereignty regulations requiring all data to be stored and processed within the country’s borders. Leadership is concerned about outsourcing security operations and needs complete control over patient data handling. The agency faces increasing cyber threats and requires 24/7 security monitoring. They have a large budget and can hire many security professionals. Which SOC model is most suitable?

Options:

A.

Outsourced SOC model

B.

Hybrid SOC model (expertise of an MSSP)

C.

In-house/internal SOC model

D.

A combination of multiple MSSPs

Buy Now
Questions 57

James Rodriguez has recently taken over as the lead SOC manager at GlobalTech Dynamics. The team is deploying a $2M SOC facility, creating incident response playbooks, running tabletop exercises, and training a 15-member incident response team to handle alerts and incidents efficiently. In the Incident Response process flow, which phase best aligns with these activities?

Options:

A.

Recovery

B.

Incident recording and assignment

C.

Preparation

D.

Incident triage

Buy Now
Questions 58

Banter is a threat analyst in Christine Group of Industries. As a part ofthe job, he is currently formatting and structuring the raw data.

He is at which stage of the threat intelligence life cycle?

Options:

A.

Dissemination and Integration

B.

Processing and Exploitation

C.

Collection

D.

Analysis and Production

Buy Now
Questions 59

SecureTech Solutions, a managed security service provider (MSSP), is optimizing its log management architecture to enhance log storage, retrieval, and analysis efficiency. The SOC team needs logs stored in a structured or semi-structured format for easy parsing, querying, and correlation. They choose a format that organizes data in a text file in a tabular structure, where each log entry is stored in rows and columns, and that supports easy export to databases or spreadsheet analysis while maintaining readability. Which log format should they choose?

Options:

A.

Comma-Separated Values (CSV) format

B.

Cloud storage

C.

Syslog format

D.

Database

Buy Now
Questions 60

Sarah Chen is a Level 1 SOC analyst at Centex Healthcare. The SOC detected a potential data breach involving unauthorized access to patient records. Multiple departments need constant updates: Legal needs HIPAA compliance implications, HR needs to coordinate staff training responses, and the MSSP requires technical details to assist containment. Which role serves as the central point of communication between these stakeholders?

Options:

A.

Incident coordinator

B.

Public relations manager

C.

Incident manager

D.

Information security officer

Buy Now
Exam Code: 312-39
Exam Name: Certified SOC Analyst (CSA v2)
Last Update: Mar 1, 2026
Questions: 200

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99