Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CyberOps Professional Changed 300-215 Questions

Page: 4 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 13

Rotor to the exhibit.

A cybersecurity analyst must analyst the logs from an Apache server for the client. The concern is that an offboarded employee home IP address was potentially used to access the company web server via a still active VPN connection Based on this log entry, what should an analyst conclude?

Options:

A.

An ex employee planted malware on the server

B.

A file was downloaded from the server

C.

A worker uploaded a file to the server

D.

An employee has accessed a web page on the server

Question 14

Refer to the exhibit.

An experienced cybersecurity analyst is investigating a sophisticated suspected breach on a Windows server within an enterprise network and compiled the evidence gathered so far Which action should the analyst prioritize to understand the scope and impact of the breach?

Options:

A.

Review the security log alterations to understand the methods used to deactivate security systems

B.

Perform a forensic memory analysis to isolate and identify the polymorphic malware's behavior and characteristics

C.

Conduct a deep dive analysis of the outbound network traffic to trace the foreign IP addresses

D.

Investigate the Windows Registry modifications for potential backdoors and establish a timeline of unauthorized changes

Question 15

Refer to the exhibit.

Which encoding technique is represented by this HEX string?

Options:

A.

Unicode

B.

Binary

C.

Base64

D.

Charcode

Question 16

During a routine inspection of system logs, a security analyst notices an entry where Microsoft Word initiated a PowerShell command with encoded arguments. Given that the user's role does not involve scripting or advanced document processing, which action should the analyst take to analyze this output for potential indicators of compromise?

Options:

A.

Monitor the Microsoft Word startup times to ensure they align with business hours.

B.

Confirm that the Microsoft Word license is valid and the application is updated to the latest version.

C.

Validate the frequency of PowerShell usage across all hosts to establish a baseline.

D.

Review the encoded PowerShell arguments to decode and determine the intent of the script.

Page: 4 / 10
Total 131 questions