Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > CyberOps Professional > 300-215

300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Question and Answers

Question # 4

An analyst finds .xyz files of unknown origin that are large and undetected by antivirus. What action should be taken next?

A.

Isolate the files and perform a deeper heuristic analysis to detect potential unknown malware or data exfiltration payloads.

B.

Rename the file extensions to .txt to enable easier opening and review by team members.

C.

Delete the files immediately to prevent potential risks.

D.

Move the files to a less secure network segment for analysis.

Full Access
Question # 5

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

A.

deobfuscation

B.

XML injection

C.

string matching

D.

data diddling

Full Access
Question # 6

Refer to the exhibit.

What should be determined from this Apache log?

A.

A module named mod_ssl is needed to make SSL connections.

B.

The private key does not match with the SSL certificate.

C.

The certificate file has been maliciously modified

D.

The SSL traffic setup is improper

Full Access
Question # 7

Refer to the exhibit. A network administrator creates an Apache log parser by using Python. What needs to be added in the box where the code is missing to accomplish the requirement?

A.

r'\d(1,3),\d(1.3),\d{13}.df{1,3}'

B.

r'*\b'

C.

r''\b{1-9}[0-9}\b'

D.

r'\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}'

Full Access
Question # 8

Which two tools conduct network traffic analysis in the absence of a graphical user interface? (Choose two.)

A.

Network Extractor

B.

TCPdump

C.

TCPshark

D.

Wireshark

E.

NetworkDebuggerPro

Full Access
Question # 9

A cybersecurity analyst must identify an unknown service causing high CPU on a Windows server. What tool should be used?

A.

Volatility to analyze memory dumps for forensic investigation

B.

Process Explorer from the Sysinternals Suite to monitor and examine active processes

C.

TCPdump to capture and analyze network packets

D.

SIFT (SANS Investigative Forensic Toolkit) for comprehensive digital forensics

Full Access
Question # 10

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?

A.

spoofing

B.

obfuscation

C.

tunneling

D.

steganography

Full Access
Question # 11

Refer to the exhibit.

An engineer is analyzing a TCP stream in Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream?

A.

It is redirecting to a malicious phishing website

B.

It is exploiting redirect vulnerability

C.

It is requesting authentication on the user site.

D.

It is sharing access to files and printers.

Full Access
Question # 12

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

A.

Inspect registry entries

B.

Inspect processes.

C.

Inspect file hash.

D.

Inspect file type.

E.

Inspect PE header.

Full Access
Question # 13

What are two features of Cisco Secure Endpoint? (Choose two.)

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

Full Access
Question # 14

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

A.

Block any URLs in received emails.

B.

Blacklist IPs 164.90.168.78 and 199.19.224.83.

C.

Block any access to and from domain apponline-8473.xyz.

D.

Block any malicious activity with xfe-threat-score-10.

E.

Block all emails sent from malicious domain apponline-8473.xyz.

Full Access
Question # 15

An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadership requested a report that identifies the problems that triggered the incident and the security team’s approach to address these problems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?

A.

impact and flow

B.

cause and effect

C.

risk and RPN

D.

motive and factors

Full Access
Question # 16

Which information is provided about the object file by the “-h” option in the objdump line commandobjdump –b oasys –m vax –h fu.o?

A.

bfdname

B.

debugging

C.

help

D.

headers

Full Access
Question # 17

A.

Evaluate the artifacts in Cisco Secure Malware Analytics.

B.

Evaluate the file activity in Cisco Umbrella.

C.

Analyze the registry activity section in Cisco Umbrella.

D.

Analyze the activity paths in Cisco Secure Malware Analytics.

Full Access
Question # 18

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Full Access
Question # 19

A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection of objects?

A.

Get-Content-Folder \Server\FTPFolder\Logfiles\ftpfiles.log | Show-From “ERROR”, “SUCCESS”

B.

Get-Content –ifmatch \Server\FTPFolder\Logfiles\ftpfiles.log | Copy-Marked “ERROR”, “SUCCESS”

C.

Get-Content –Directory \Server\FTPFolder\Logfiles\ftpfiles.log | Export-Result “ERROR”, “SUCCESS”

D.

Get-Content –Path \Server\FTPFolder\Logfiles\ftpfiles.log | Select-String “ERROR”, “SUCCESS”

Full Access
Question # 20

Refer to the exhibit.

What is occurring?

A.

The request was redirected.

B.

WAF detected code injection.

C.

An attacker attempted SQL injection.

D.

The requested page was not found.

Full Access
Question # 21

During a routine security audit, an organization's security team detects an unusual spike in network traffic originating from one of their internal servers. Upon further investigation, the team discovered that the server was communicating with an external IP address known for hosting malicious content. The security team suspects that the server may have been compromised. As the incident response process begins, which two actions should be taken during the initial assessment phase of this incident? (Choose two.)

A.

Notify law enforcement agencies about the incident.

B.

Disconnect the compromised server from the network.

C.

Conduct a comprehensive forensic analysis of the server hard drive.

D.

Interview employees who have access to the server.

E.

Review the organization's network logs for any signs of intrusion.

Full Access
Question # 22

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

A.

Review the database.log file in the program files directory for database errors

B.

Examine the system.cfg file in the Windows directory for improper system configurations

C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration

D.

Check the Memory.dmp file in the Windows directory for memory leak indications

Full Access
Question # 23

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

A.

endpoint detection and response

B.

secure email gateway

C.

data loss prevention

D.

intrusion prevention system

E.

web application firewall

Full Access
Question # 24

A security team is notified from a Cisco ESA solution that an employee received an advertising email with an attached .pdf extension file. The employee opened the attachment, which appeared to be an empty document. The security analyst cannot identify clear signs of compromise but reviews running processes and determines that PowerShell.exe was spawned by CMD.exe with a grandparent AcroRd32.exe process. Which two actions should be taken to resolve this issue? (Choose two.)

A.

Upload the .pdf file to Cisco Threat Grid and analyze suspicious activity in depth.

B.

No action is required because this behavior is standard for .pdf files.

C.

Check the Windows Event Viewer for security logs about the incident.

D.

Quarantine this workstation for further investigation, as this event is an indication of suspicious activity.

E.

Investigate the reputation of the sender address and temporarily block all communications with this email domain.

Full Access
Question # 25

Refer to the exhibit.

A web hosting company analyst is analyzing the latest traffic because there was a 20% spike in server CPU usage recently. After correlating the logs, the problem seems to be related to the bad actor activities. Which attack vector is used and what mitigation can the analyst suggest?

A.

SQL Injection; implement input validation and use parameterized queries.

B.

Distributed denial of service; use rate limiting and DDoS protection services.

C.

Phishing attack; conduct regular user training and use email filtering solutions.

D.

Brute-force attack; implement account lockout policies and roll out MFA.

Full Access
Question # 26

A malware outbreak revealed that a firewall was misconfigured, allowing external access to the SharePoint server. What should the security team do next?

A.

Scan for and fix vulnerabilities on the firewall and server

B.

Harden the SharePoint server

C.

Disable external IP communications on all firewalls

D.

Review and update all firewall rules and the network security policy

Full Access
Question # 27

Refer to the exhibit.

The application x-dosexec with hash 691c65e4fb1d19f82465df1d34ad51aaeceba14a78167262dc7b2840a6a6aa87 is reported as malicious and labeled as "Trojan.Generic" by the threat intelligence tool. What is considered an indicator of compromise?

A.

modified registry

B.

hooking

C.

process injection

D.

data compression

Full Access
Question # 28

An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?

A.

phishing email sent to the victim

B.

alarm raised by the SIEM

C.

information from the email header

D.

alert identified by the cybersecurity team

Full Access
Question # 29

Refer to the exhibit.

Which determination should be made by a security analyst?

A.

An email was sent with an attachment named “Grades.doc.exe”.

B.

An email was sent with an attachment named “Grades.doc”.

C.

An email was sent with an attachment named “Final Report.doc”.

D.

An email was sent with an attachment named “Final Report.doc.exe”.

Full Access
Question # 30

A.

JavaScript

B.

Base64

C.

ascii85

D.

hexadecimal

Full Access
Question # 31

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

A.

FILE-OFFICE Microsoft Graphics buffer overflow

B.

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.

FILE-OFFICE Microsoft Graphics remote code execution attempt

Full Access
Question # 32

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

A.

Upload the file signature to threat intelligence tools to determine if the file is malicious.

B.

Monitor processes as this is standard behavior of Word macro embedded documents.

C.

Contain the threat for further analysis as this is an indication of suspicious activity.

D.

Investigate the sender of the email and communicate with the employee to determine the motives.

Full Access
Question # 33

Drag and drop the steps from the left into the order to perform forensics analysis of infrastructure networks on the right.

Full Access
Question # 34

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

A.

verify the breadth of the attack

B.

collect logs

C.

request packet capture

D.

remove vulnerabilities

E.

scan hosts with updated signatures

Full Access