Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Full Version 300-215 Cisco Exam

Page: 2 / 9
Total 115 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 5

Refer to the exhibit.

What is the IOC threat and URL in this STIX JSON snippet?

Options:

A.

malware; ‘http://x4z9arb.cn/4712/’

B.

malware; x4z9arb backdoor

C.

x4z9arb backdoor;http://x4z9arb.cn/4712/

D.

malware; malware--162d917e-766f-4611-b5d6-652791454fca

E.

stix; ‘http://x4z9arb.cn/4712/’

Question 6

Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 7

Refer to the exhibit.

What is occurring?

Options:

A.

Obfuscated scripts are getting executed on the victim machine.

B.

Malware is modifying the registry keys.

C.

RDP is used to move laterally to systems within the victim environment.

D.

The threat actor creates persistence by creating a repeatable task.

Question 8

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Page: 2 / 9
Total 115 questions