Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

300-215 Exam Dumps - Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Go to page:
Question # 17

An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?

A.

phishing email sent to the victim

B.

alarm raised by the SIEM

C.

information from the email header

D.

alert identified by the cybersecurity team

Full Access
Question # 18

A workstation uploads encrypted traffic to a known clean domain over TCP port 80. What type of attack is occurring, according to the MITRE ATT&CK matrix?

A.

Exfiltration Over Web Service

B.

Exfiltration Over C2 Channel

C.

Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

D.

Command and Control Activity

Full Access
Question # 19

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

A.

anti-malware software

B.

data and workload isolation

C.

centralized user management

D.

intrusion prevention system

E.

enterprise block listing solution

Full Access
Question # 20

A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?

A.

Reset the reporting user's account and enable multifactor authentication.

B.

Create a detailed incident report and share it with top management.

C.

Find any other emails coming from the IP address ranges that are managed by XYZCloud.

D.

Delete email from user mailboxes and update the incident ticket with lessons learned.

Full Access
Question # 21

Refer to the exhibit.

Which type of code created the snippet?

A.

VB Script

B.

Python

C.

PowerShell

D.

Bash Script

Full Access
Question # 22

Refer to the exhibit.

What do these artifacts indicate?

A.

An executable file is requesting an application download.

B.

A malicious file is redirecting users to different domains.

C.

The MD5 of a file is identified as a virus and is being blocked.

D.

A forged DNS request is forwarding users to malicious websites.

Full Access
Question # 23

Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?

A.

process injection

B.

privilege escalation

C.

GPO modification

D.

token manipulation

Full Access
Question # 24

Refer to the exhibit.

What is occurring within the exhibit?

A.

Source 10.1.21.101 sends HTTP requests with the size of 302 kb.

B.

Host 209.141.51.196 redirects the client request from /Lk9tdZ to /files/1.bin.

C.

Host 209.141.51.196 redirects the client request to port 49723.

D.

Source 10.1.21.101 is communicating with 209.141.51.196 over an encrypted channel.

Full Access
Go to page: