Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Cisco 300-215 Dumps

Page: 1 / 13
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 1

Refer to the exhibit.

as

An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?

Options:

A.

Delete the suspicious email with the attachment as the file is a shortcut extension and does not represent any threat.

B.

Upload the file to a virus checking engine to compare with well-known viruses as the file is a virus disguised as a legitimate extension.

C.

Quarantine the file within the endpoint antivirus solution as the file is a ransomware which will encrypt the documents of a victim.

D.

Open the file in a sandbox environment for further behavioral analysis as the file contains a malicious script that runs on execution.

Question 2

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

Options:

A.

endpoint detection and response

B.

secure email gateway

C.

data loss prevention

D.

intrusion prevention system

E.

web application firewall

Question 3

An analyst finds .xyz files of unknown origin that are large and undetected by antivirus. What action should be taken next?

Options:

A.

Isolate the files and perform a deeper heuristic analysis to detect potential unknown malware or data exfiltration payloads.

B.

Rename the file extensions to .txt to enable easier opening and review by team members.

C.

Delete the files immediately to prevent potential risks.

D.

Move the files to a less secure network segment for analysis.

Question 4

Which tool conducts memory analysis?

Options:

A.

MemDump

B.

Sysinternals Autoruns

C.

Volatility

D.

Memoryze

Question 5

What is a use of TCPdump?

Options:

A.

to analyze IP and other packets

B.

to view encrypted data fields

C.

to decode user credentials

D.

to change IP ports

Question 6

Which tool should be used for dynamic malware analysis?

Options:

A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

Question 7

Refer to the exhibit.

as

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Options:

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Question 8

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.

analysis of the organization's network architecture and security infrastructure

C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware

Question 9

A cybersecurity analyst must identify an unknown service causing high CPU on a Windows server. What tool should be used?

Options:

A.

Volatility to analyze memory dumps for forensic investigation

B.

Process Explorer from the Sysinternals Suite to monitor and examine active processes

C.

TCPdump to capture and analyze network packets

D.

SIFT (SANS Investigative Forensic Toolkit) for comprehensive digital forensics

Question 10

An engineer must advise on how YARA rules can enhance detection capabilities. What can YARA rules be used to identify?

Options:

A.

suspicious web requests

B.

suspicious files that match specific conditions

C.

suspicious emails and possible phishing attempts

D.

network traffic patterns

Question 11

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

Options:

A.

Upload the file signature to threat intelligence tools to determine if the file is malicious.

B.

Monitor processes as this is standard behavior of Word macro embedded documents.

C.

Contain the threat for further analysis as this is an indication of suspicious activity.

D.

Investigate the sender of the email and communicate with the employee to determine the motives.

Question 12

as

Options:

A.

Destination IP 51.38.124.206 is identified as malicious

B.

MD5 D634c0ba04a4e9140761cbd7b057t>8c5 is identified as malicious

C.

Path http-req-51.38.124.206-80-14-1 is benign

D.

The stream must be analyzed further via the pcap file

Question 13

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

Options:

A.

Review the database.log file in the program files directory for database errors

B.

Examine the system.cfg file in the Windows directory for improper system configurations

C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration

D.

Check the Memory.dmp file in the Windows directory for memory leak indications

Question 14

A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s behavior. Which logs should be reviewed next to evaluate this file further?

Options:

A.

email security appliance

B.

DNS server

C.

Antivirus solution

D.

network device

Question 15

as

Options:

A.

Evaluate the artifacts in Cisco Secure Malware Analytics.

B.

Evaluate the file activity in Cisco Umbrella.

C.

Analyze the registry activity section in Cisco Umbrella.

D.

Analyze the activity paths in Cisco Secure Malware Analytics.

Question 16

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

Options:

A.

Inspect registry entries

B.

Inspect processes.

C.

Inspect file hash.

D.

Inspect file type.

E.

Inspect PE header.

Question 17

An incident response team is recommending changes after analyzing a recent compromise in which:

    a large number of events and logs were involved;

    team members were not able to identify the anomalous behavior and escalate it in a timely manner;

    several network systems were affected as a result of the latency in detection;

    security engineers were able to mitigate the threat and bring systems back to a stable state; and

    the issue reoccurred shortly after and systems became unstable again because the correct information was not gathered during the initial identification phase.

Which two recommendations should be made for improving the incident response process? (Choose two.)

Options:

A.

Formalize reporting requirements and responsibilities to update management and internal stakeholders throughout the incident-handling process effectively.

B.

Improve the mitigation phase to ensure causes can be quickly identified, and systems returned to a functioning state.

C.

Implement an automated operation to pull systems events/logs and bring them into an organizational context.

D.

Allocate additional resources for the containment phase to stabilize systems in a timely manner and reduce an attack’s breadth.

E.

Modify the incident handling playbook and checklist to ensure alignment and agreement on roles, responsibilities, and steps before an incident occurs.

Question 18

A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection of objects?

Options:

A.

Get-Content-Folder \Server\FTPFolder\Logfiles\ftpfiles.log | Show-From “ERROR”, “SUCCESS”

B.

Get-Content –ifmatch \Server\FTPFolder\Logfiles\ftpfiles.log | Copy-Marked “ERROR”, “SUCCESS”

C.

Get-Content –Directory \Server\FTPFolder\Logfiles\ftpfiles.log | Export-Result “ERROR”, “SUCCESS”

D.

Get-Content –Path \Server\FTPFolder\Logfiles\ftpfiles.log | Select-String “ERROR”, “SUCCESS”

Question 19

What can the blue team achieve by using Hex Fiend against a piece of malware?

Options:

A.

Use the hex data to define patterns in VARA rules.

B.

Read the hex data and transmognify into a readable ELF format

C.

Use the hex data to modify BE header to read the file.

D.

Read the hex data and decrypt payload via access key.

Question 20

Refer to the exhibit.

as

A company that uses only the Unix platform implemented an intrusion detection system. After the initial configuration, the number of alerts is overwhelming, and an engineer needs to analyze and classify the alerts. The highest number of alerts were generated from the signature shown in the exhibit. Which classification should the engineer assign to this event?

Options:

A.

True Negative alert

B.

False Negative alert

C.

False Positive alert

D.

True Positive alert

Question 21

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

Options:

A.

deobfuscation

B.

XML injection

C.

string matching

D.

data diddling

Question 22

Refer to the exhibit.

as

An engineer received a ticket to analyze a recent breach on a company blog. Every time users visit the blog, they are greeted with a message box. The blog allows users to register, log in, create, and provide comments on various topics. Due to the legacy build of the application, it stores user information in the outdated MySQL database. What is the recommended action that an engineer should take?

Options:

A.

Validate input on arrival as strictly as possible.

B.

Implement TLS 1.3 for external communications.

C.

Match the web server software for the front-end and back-end servers.

D.

Upgrade the MySQL database.

Question 23

An organization fell victim to a ransomware attack that successfully infected 256 hosts within its network. In the aftermath of this incident, the organization's cybersecurity team must prepare a thorough root cause analysis report. This report aims to identify the primary factor or factors that led to the successful ransomware attack and to develop strategies for preventing similar incidents in the future. In this context, what should the cybersecurity engineer include in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

log files from each of the 256 infected hosts

B.

detailed information about the specific team members involved in the incident response effort

C.

method of infection employed by the ransomware

D.

complete threat intelligence report shared by the National CERT Association

Question 24

Refer to the exhibit.

as

An engineer is analyzing a TCP stream in Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream?

Options:

A.

It is redirecting to a malicious phishing website

B.

It is exploiting redirect vulnerability

C.

It is requesting authentication on the user site.

D.

It is sharing access to files and printers.

Question 25

A financial company handling international transactions recently experienced a complex security incident The incident involves simultaneous DDoS attacks, suspected internal data leakage and the discovery of sophisticated malware implants that have remained dormant until triggered remotely During the incident it became clear that the current procedures are inadequate and plans to tackle issues were created on the go To counter this problem going forward, the IR team is developing an incident playbook to be used if a similar incident reoccurs Which set of elements of the playbook must be introduced?

Options:

A.

Introducing DDoS mitigation procedures, internal data leak investigations, and proactive malware containment

B.

Establishing real-time collaboration procedures, increasing data encryption and revising access controls

C.

Engaging third-party cybersecurity experts expanding throat intelligence sharing and improving incident documentation

D.

Enhancing monitoring protocols, updating firewall rules, and automating traffic analysis tasks efficiently

Question 26

Refer to the exhibit.

as

Which type of code is shown?

Options:

A.

VBScript

B.

shell

C.

Bash

D.

Python

Question 27

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

Options:

A.

/var/log/access.log

B.

/var/log/messages.log

C.

/var/log/httpd/messages.log

D.

/var/log/httpd/access.log

Question 28

Refer to the exhibit.

as

The application x-dosexec with hash 691c65e4fb1d19f82465df1d34ad51aaeceba14a78167262dc7b2840a6a6aa87 is reported as malicious and labeled as "Trojan.Generic" by the threat intelligence tool. What is considered an indicator of compromise?

Options:

A.

modified registry

B.

hooking

C.

process injection

D.

data compression

Question 29

What is the function of a disassembler?

Options:

A.

aids performing static malware analysis

B.

aids viewing and changing the running state

C.

aids transforming symbolic language into machine code

D.

aids defining breakpoints in program execution

Question 30

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

Options:

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Question 31

During a recent incident response investigation, several suspicious network connections originating from a specific host were identified. The host was quickly isolated and the machine was rebuilt During the post mortem, it became clear that there was unpreparedness regarding network artifacts necessitating adjustments to the playbooks to address this data from multiple sources must be correlated. Which two sources should be prioritized for data gathering? (Choose two.)

Options:

A.

Netflow data and host firewall logs

B.

user authentication logs and packet capture data

C.

antivirus alerts and system event togs

D.

application and system error logs

E.

DNS logs and web server togs

Question 32

Refer to the exhibit.

as

What does the exhibit indicate?

Options:

A.

The new file is created under the Software\Classes disk folder.

B.

A UAC bypass is created by modifying user-accessible registry settings.

C.

A scheduled task named "DelegateExecute" is created.

D.

The shell software is modified via PowerShell.

Question 33

Refer to the exhibit.

as

What should an engineer determine from this Wireshark capture of suspicious network traffic?

Options:

A.

There are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections.

B.

There are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure.

C.

There are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure.

D.

There are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure.

Question 34

as

Options:

A.

Initiate a connection to 23.1.4.14 over port 8443.

B.

Generate a Windows executable file.

C.

Open the Mozilla Firefox browser.

D.

Validate the SSL certificate for 23.1.4.14.

Question 35

A security team needs to prevent a remote code execution vulnerability. The vulnerability can be exploited only by sending '${ string in the HTTP request. WAF rule is blocking '${', but system engineers detect that attackers are executing commands on the host anyway. Which action should the security team recommend?

Options:

A.

Enable URL decoding on WAF.

B.

Block incoming web traffic.

C.

Add two WAF rules to block 'S' and '{' characters separately.

D.

Deploy antimalware solution.

Question 36

as

Options:

A.

VBScript

B.

Python

C.

Bash

D.

shell

Question 37

Refer to the exhibit.

as

Which type of code created the snippet?

Options:

A.

VB Script

B.

Python

C.

PowerShell

D.

Bash Script

Question 38

A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?

Options:

A.

root cause

B.

intrusion prevention

C.

incident response

D.

attack surface

Question 39

Refer to the exhibit.

as

What is the indicator of compromise?

Options:

A.

SHA256 file hash

B.

indicator ID: malware--a932fcc6-e032-476c-826f-cb970a569bce

C.

indicator type: malicious-activity

D.

MD5 file hash

Page: 1 / 13
Total 131 questions