Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-215 - Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Page: 2 / 4
Total 115 questions

Refer to the exhibit.

According to the SNORT alert, what is the attacker performing?

A.

brute-force attack against the web application user accounts

B.

XSS attack against the target webserver

C.

brute-force attack against directories and files on the target webserver

D.

SQL injection attack against the target webserver

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

A.

Inspect registry entries

B.

Inspect processes.

C.

Inspect file hash.

D.

Inspect file type.

E.

Inspect PE header.

What is an issue with digital forensics in cloud environments, from a security point of view?

A.

weak cloud computer specifications

B.

lack of logs

C.

no physical access to the hard drive

D.

network access instability

Refer to the exhibit.

An engineer is analyzing a TCP stream in Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream?

A.

It is redirecting to a malicious phishing website

B.

It is exploiting redirect vulnerability

C.

It is requesting authentication on the user site.

D.

It is sharing access to files and printers.

A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)

A.

Introduce a priority rating for incident response workloads.

B.

Provide phishing awareness training for the full security team.

C.

Conduct a risk audit of the incident response workflow.

D.

Create an executive team delegation plan.

E.

Automate security alert timeframes with escalation triggers.

A.

Destination IP 51.38.124.206 is identified as malicious

B.

MD5 D634c0ba04a4e9140761cbd7b057t>8c5 is identified as malicious

C.

Path http-req-51.38.124.206-80-14-1 is benign

D.

The stream must be analyzed further via the pcap file

A cybersecurity analyst is analyzing a complex set of threat intelligence data from internal and external sources. Among the data, they discover a series of indicators, including patterns of unusual network traffic, a sudden increase in failed login attempts, and multiple instances of suspicious file access on the company's internal servers. Additionally, an external threat feed highlights that threat actors are actively targeting organizations in the same industry using ransomware. Which action should the analyst recommend?

A.

Advise on monitoring the situation passively because network traffic anomalies are coincidental and unrelated to the ransomware threat.

B.

Propose isolation of affected systems and activating the incident response plan because the organization is likely under attack by the new ransomware strain.

C.

Advocate providing additional training on secure login practices because the increase in failed login attempts is likely a result of employee error.

D.

Notify of no requirement for immediate action because the suspicious file access incidents are normal operational activities and do not indicate an ongoing threat.

Refer to the exhibit.

What is occurring within the exhibit?

A.

Source 10.1.21.101 sends HTTP requests with the size of 302 kb.

B.

Host 209.141.51.196 redirects the client request from /Lk9tdZ to /files/1.bin.

C.

Host 209.141.51.196 redirects the client request to port 49723.

D.

Source 10.1.21.101 is communicating with 209.141.51.196 over an encrypted channel.

Refer to the exhibit.

Which type of code created the snippet?

A.

VB Script

B.

Python

C.

PowerShell

D.

Bash Script