Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected 300-215 CyberOps Professional Questions Answers

Page: 9 / 10
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 33

Refer to the exhibit.

According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

Options:

A.

Domain name: iraniansk.com

B.

Server: nginx

C.

Hash value: 5f31ab113af08=1597090577

D.

filename= “Fy.exe”

E.

Content-Type: application/octet-stream

Question 34

A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?

Options:

A.

Reset the reporting user's account and enable multifactor authentication.

B.

Create a detailed incident report and share it with top management.

C.

Find any other emails coming from the IP address ranges that are managed by XYZCloud.

D.

Delete email from user mailboxes and update the incident ticket with lessons learned.

Question 35

Which issue is related to gathering evidence from cloud vendors?

Options:

A.

Deleted data cannot be recovered in cloud services.

B.

There is limited access to physical media.

C.

Forensics tools do not apply on cloud services.

D.

The chain of custody does not apply on cloud services.

Question 36

Refer to the exhibit.

Which type of code is shown?

Options:

A.

VBScript

B.

shell

C.

Bash

D.

Python

Page: 9 / 10
Total 131 questions