Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-215 - Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Page: 3 / 4
Total 115 questions

Refer to the exhibit.

What is occurring?

A.

The request was redirected.

B.

WAF detected code injection.

C.

An attacker attempted SQL injection.

D.

The requested page was not found.

A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?

A.

root cause

B.

intrusion prevention

C.

incident response

D.

attack surface

Refer to the exhibit. A network administrator creates an Apache log parser by using Python. What needs to be added in the box where the code is missing to accomplish the requirement?

A.

r'\d(1,3),\d(1.3),\d{13}.df{1,3}'

B.

r'*\b'

C.

r''\b{1-9}[0-9}\b'

D.

r'\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}'

Refer to the exhibit.

An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

A.

data obfuscation

B.

reconnaissance attack

C.

brute-force attack

D.

log tampering

A workstation uploads encrypted traffic to a known clean domain over TCP port 80. What type of attack is occurring, according to the MITRE ATT&CK matrix?

A.

Exfiltration Over Web Service

B.

Exfiltration Over C2 Channel

C.

Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

D.

Command and Control Activity

Drag and drop the capabilities on the left onto the Cisco security solutions on the right.

Which magic byte indicates that an analyzed file is a pdf file?

A.

cGRmZmlsZQ

B.

706466666

C.

255044462d

D.

0a0ah4cg

Drag and drop the steps from the left into the order to perform forensics analysis of infrastructure networks on the right.

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

A.

/var/log/access.log

B.

/var/log/messages.log

C.

/var/log/httpd/messages.log

D.

/var/log/httpd/access.log

Refer to the exhibit.

Which type of code is being used?

A.

Shell

B.

VBScript

C.

BASH

D.

Python