Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass 300-215 Exam Guide

Page: 3 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 9

Refer to the exhibit.

What do these artifacts indicate?

Options:

A.

An executable file is requesting an application download.

B.

A malicious file is redirecting users to different domains.

C.

The MD5 of a file is identified as a virus and is being blocked.

D.

A forged DNS request is forwarding users to malicious websites.

Question 10

Options:

A.

JavaScript

B.

Base64

C.

ascii85

D.

hexadecimal

Question 11

An organization fell victim to a ransomware attack that successfully infected 256 hosts within its network. In the aftermath of this incident, the organization's cybersecurity team must prepare a thorough root cause analysis report. This report aims to identify the primary factor or factors that led to the successful ransomware attack and to develop strategies for preventing similar incidents in the future. In this context, what should the cybersecurity engineer include in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

log files from each of the 256 infected hosts

B.

detailed information about the specific team members involved in the incident response effort

C.

method of infection employed by the ransomware

D.

complete threat intelligence report shared by the National CERT Association

Question 12

Refer to the exhibit.

What should be determined from this Apache log?

Options:

A.

A module named mod_ssl is needed to make SSL connections.

B.

The private key does not match with the SSL certificate.

C.

The certificate file has been maliciously modified

D.

The SSL traffic setup is improper

Page: 3 / 10
Total 131 questions