Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Full Version 300-215 Cisco Exam

Page: 2 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 5

An insider scattered multiple USB flash drives with zero-day malware in a company HQ building. Many employees connected the USB flash drives to their workstations. An attacker was able to get access to endpoints from outside, steal user credentials, and exfiltrate confidential information from internal web resources. Which two steps prevent these types of security incidents in the future? (Choose two.)

Options:

A.

Automate security alerts on connected USB flash drives to workstations.

B.

Provide security awareness training and block usage of external drives.

C.

Deploy antivirus software on employee workstations to detect malicious software.

D.

Encrypt traffic from employee workstations to internal web services.

E.

Deploy MFA authentication to prevent unauthorized access to critical assets.

Question 6

Which tool should be used for dynamic malware analysis?

Options:

A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

Question 7

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

Options:

A.

deobfuscation

B.

XML injection

C.

string matching

D.

data diddling

Question 8

Refer to the exhibit.

What does the exhibit indicate?

Options:

A.

The new file is created under the Software\Classes disk folder.

B.

A UAC bypass is created by modifying user-accessible registry settings.

C.

A scheduled task named "DelegateExecute" is created.

D.

The shell software is modified via PowerShell.

Page: 2 / 10
Total 131 questions