Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Complete 300-215 Cisco Materials

Page: 10 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 37

Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 38

A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?

Options:

A.

Cisco Secure Firewall ASA

B.

Cisco Secure Firewall Threat Defense (Firepower)

C.

Cisco Secure Email Gateway (ESA)

D.

Cisco Secure Web Appliance (WSA)

Question 39

What are YARA rules based upon?

Options:

A.

binary patterns

B.

HTML code

C.

network artifacts

D.

IP addresses

Page: 10 / 10
Total 131 questions