Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

300-215 Exam Dumps - Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Go to page:
Question # 4

An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ProfileList

C.

HKEY_CURRENT_USER\Software\Classes\Winlog

D.

HKEY_LOCAL_MACHINES\SOFTWARE\Microsoft\WindowsNT\CurrentUser

Full Access
Question # 5

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

A.

/var/log/access.log

B.

/var/log/messages.log

C.

/var/log/httpd/messages.log

D.

/var/log/httpd/access.log

Full Access
Question # 6

A.

Initiate a connection to 23.1.4.14 over port 8443.

B.

Generate a Windows executable file.

C.

Open the Mozilla Firefox browser.

D.

Validate the SSL certificate for 23.1.4.14.

Full Access
Question # 7

Refer to the exhibit.

What is the indicator of compromise?

A.

SHA256 file hash

B.

indicator ID: malware--a932fcc6-e032-476c-826f-cb970a569bce

C.

indicator type: malicious-activity

D.

MD5 file hash

Full Access
Question # 8

A cybersecurity analyst detects fileless malware activity on secure endpoints. What should be done next?

A.

Immediately quarantine the endpoints containing the suspicious files and consider the issue resolved

B.

Isolate the affected endpoints and conduct a detailed memory analysis to identify fileless malware execution.

C.

Delete the suspicious files and monitor the endpoints for any further signs of compromise.

D.

Share the findings with other government agencies for collaborative threat analysis and response.

Full Access
Go to page: