Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CyberOps Professional 300-215 Exam Dumps

Page: 7 / 9
Total 115 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 25

Refer to the exhibit.

What is occurring?

Options:

A.

The request was redirected.

B.

WAF detected code injection.

C.

An attacker attempted SQL injection.

D.

The requested page was not found.

Question 26

Refer to the exhibit.

Which encoding technique is represented by this HEX string?

Options:

A.

Unicode

B.

Binary

C.

Base64

D.

Charcode

Question 27

Refer to the exhibit.

An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?

Options:

A.

Delete the suspicious email with the attachment as the file is a shortcut extension and does not represent any threat.

B.

Upload the file to a virus checking engine to compare with well-known viruses as the file is a virus disguised as a legitimate extension.

C.

Quarantine the file within the endpoint antivirus solution as the file is a ransomware which will encrypt the documents of a victim.

D.

Open the file in a sandbox environment for further behavioral analysis as the file contains a malicious script that runs on execution.

Question 28

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

Options:

A.

encryption

B.

tunneling

C.

obfuscation

D.

poisoning

Page: 7 / 9
Total 115 questions