Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Changed 300-215 Exam Questions

Page: 8 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 29

What describes the first step in performing a forensic analysis of infrastructure network devices?

Options:

A.

immediately disconnecting the device from the network

B.

initiating an immediate full system scan

C.

resetting the device to factory settings and analyzing the difference

D.

producing an accurate, forensic-grade duplicate of the device's data

Question 30

What is the transmogrify anti-forensics technique?

Options:

A.

hiding a section of a malicious file in unused areas of a file

B.

sending malicious files over a public network by encapsulation

C.

concealing malicious files in ordinary or unsuspecting places

D.

changing the file header of a malicious file to another file type

Question 31

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

Options:

A.

anti-malware software

B.

data and workload isolation

C.

centralized user management

D.

intrusion prevention system

E.

enterprise block listing solution

Question 32

During an overnight shift, a cybersecurity team at a global trading firm detects irregular activity The network intrusion system flags an encrypted traffic spike from high-value transaction servers to an anonymous Tor exit node Simultaneously, internal surveillance tools report unusual database queries and access patterns resembling exfiltration techniques Which focused action should the team take first to analyze and address these potential security threats?

Options:

A.

Initiate immediate containment protocols tor transaction servers.

B.

Implement dynamic firewall rules to block suspicious outbound connections

C.

Cross-reference database access logs with user activity profiles

D.

Engage advanced decryption and anomaly analysis for the flagged traffic

Page: 8 / 10
Total 131 questions