Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-215 Exam Dumps - Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Go to page:
Question # 25

A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?

A.

Cisco Secure Firewall ASA

B.

Cisco Secure Firewall Threat Defense (Firepower)

C.

Cisco Secure Email Gateway (ESA)

D.

Cisco Secure Web Appliance (WSA)

Full Access
Question # 26

What is an antiforensic technique to cover a digital footprint?

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Full Access
Question # 27

Refer to the exhibit.

What should be determined from this Apache log?

A.

A module named mod_ssl is needed to make SSL connections.

B.

The private key does not match with the SSL certificate.

C.

The certificate file has been maliciously modified

D.

The SSL traffic setup is improper

Full Access
Question # 28

What is a use of TCPdump?

A.

to analyze IP and other packets

B.

to view encrypted data fields

C.

to decode user credentials

D.

to change IP ports

Full Access
Question # 29

Refer to the exhibit.

An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hours prior. Which two indicators of compromise should be determined from this information? (Choose two.)

A.

unauthorized system modification

B.

privilege escalation

C.

denial of service attack

D.

compromised root access

E.

malware outbreak

Full Access
Question # 30

What are two features of Cisco Secure Endpoint? (Choose two.)

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

Full Access
Question # 31

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

A.

Review the database.log file in the program files directory for database errors

B.

Examine the system.cfg file in the Windows directory for improper system configurations

C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration

D.

Check the Memory.dmp file in the Windows directory for memory leak indications

Full Access
Question # 32

Refer to the exhibit. A security analyst notices that a web application running on NGINX is generating an unusual number of log messages. The application is operational and reachable. What is the cause of this activity?

A.

botnet infection

B.

directory fuzzing

C.

DDoS attack

D.

SQL injection

Full Access
Go to page: