Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release 300-215 CyberOps Professional Questions

Page: 5 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 17

Options:

A.

Evaluate the artifacts in Cisco Secure Malware Analytics.

B.

Evaluate the file activity in Cisco Umbrella.

C.

Analyze the registry activity section in Cisco Umbrella.

D.

Analyze the activity paths in Cisco Secure Malware Analytics.

Question 18

An attacker modifies a malicious file named TOPSECRET0523619132 by changing its file extension from a .png to a doc in an attempt to evade detection. Which technique is being used to disguise the file?

Options:

A.

steganography

B.

obfuscatiofi

C.

spoofing

D.

hashing

Question 19

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

Options:

A.

FILE-OFFICE Microsoft Graphics buffer overflow

B.

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.

FILE-OFFICE Microsoft Graphics remote code execution attempt

Question 20

Refer to the exhibit.

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Options:

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Page: 5 / 10
Total 131 questions