Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-215 - Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Page: 1 / 4
Total 131 questions

Refer to the exhibit.

An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hours prior. Which two indicators of compromise should be determined from this information? (Choose two.)

A.

unauthorized system modification

B.

privilege escalation

C.

denial of service attack

D.

compromised root access

E.

malware outbreak

Which two tools conduct network traffic analysis in the absence of a graphical user interface? (Choose two.)

A.

Network Extractor

B.

TCPdump

C.

TCPshark

D.

Wireshark

E.

NetworkDebuggerPro

Refer to the exhibit.

An experienced cybersecurity analyst is investigating a sophisticated suspected breach on a Windows server within an enterprise network and compiled the evidence gathered so far Which action should the analyst prioritize to understand the scope and impact of the breach?

A.

Review the security log alterations to understand the methods used to deactivate security systems

B.

Perform a forensic memory analysis to isolate and identify the polymorphic malware's behavior and characteristics

C.

Conduct a deep dive analysis of the outbound network traffic to trace the foreign IP addresses

D.

Investigate the Windows Registry modifications for potential backdoors and establish a timeline of unauthorized changes

Refer to the exhibit.

Which element in this email is an indicator of attack?

A.

IP Address: 202.142.155.218

B.

content-Type: multipart/mixed

C.

attachment: “Card-Refund”

D.

subject: “Service Credit Card”

Refer to the exhibit.

Which encoding method is used to obfuscate the script?

A.

ASCII85 encoding

B.

Base64 encoding

C.

metamorphic encoding

D.

hex encoding

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

A.

Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

B.

Block all emails sent from an @state.gov address.

C.

Block all emails with pdf attachments.

D.

Block emails sent from Admin@state.net with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

E.

Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

Over the last year, an organization’s HR department has accessed data from its legal department on the last day of each month to create a monthly activity report. An engineer is analyzing suspicious activity alerted by a threat intelligence platform that an authorized user in the HR department has accessed legal data daily for the last week. The engineer pulled the network data from the legal department’s shared folders and discovered above average-size data dumps. Which threat actor is implied from these artifacts?

A.

privilege escalation

B.

internal user errors

C.

malicious insider

D.

external exfiltration

A.

JavaScript

B.

Base64

C.

ascii85

D.

hexadecimal

Refer to the exhibit.

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.

analysis of the organization's network architecture and security infrastructure

C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware