Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Exam Practice Test

Page: 1 / 12
Total 115 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event?

Options:

A.

DNS spoofing; encrypt communication protocols

B.

SYN flooding; block malicious packets

C.

ARP spoofing; configure port security

D.

MAC flooding; assign static entries

Question 2

A new zero-day vulnerability is discovered in the web application. Vulnerability does not require physical access and can be exploited remotely. Attackers are exploiting the new vulnerability by submitting a form with malicious content that grants them access to the server. After exploitation, attackers delete the log files to hide traces. Which two actions should the security engineer take next? (Choose two.)

Options:

A.

Validate input upon submission.

B.

Block connections on port 443.

C.

Install antivirus.

D.

Update web application to the latest version.

E.

Enable file integrity monitoring.

Question 3

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

Options:

A.

Inspect registry entries

B.

Inspect processes.

C.

Inspect file hash.

D.

Inspect file type.

E.

Inspect PE header.

Question 4

Refer to the exhibit.

Question # 4

Options:

A.

hex encoding

B.

metamorphic encoding

C.

ASCII85 encoding

D.

Base64 encoding

Question 5

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Question 6

Refer to the exhibit.

Question # 6

Which type of code created the snippet?

Options:

A.

VB Script

B.

Python

C.

PowerShell

D.

Bash Script

Question 7

What describes the first step in performing a forensic analysis of infrastructure network devices?

Options:

A.

immediately disconnecting the device from the network

B.

initiating an immediate full system scan

C.

resetting the device to factory settings and analyzing the difference

D.

producing an accurate, forensic-grade duplicate of the device's data

Question 8

A malware outbreak revealed that a firewall was misconfigured, allowing external access to the SharePoint server. What should the security team do next?

Options:

A.

Scan for and fix vulnerabilities on the firewall and server

B.

Harden the SharePoint server

C.

Disable external IP communications on all firewalls

D.

Review and update all firewall rules and the network security policy

Question 9

What is a use of TCPdump?

Options:

A.

to analyze IP and other packets

B.

to view encrypted data fields

C.

to decode user credentials

D.

to change IP ports

Question 10

Refer to the exhibit.

Question # 10

After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business-critical, web-based application and violated its availability. Which two mitigation techniques should the engineer recommend? (Choose two.)

Options:

A.

encapsulation

B.

NOP sled technique

C.

address space randomization

D.

heap-based security

E.

data execution prevention

Question 11

A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection of objects?

Options:

A.

Get-Content-Folder \Server\FTPFolder\Logfiles\ftpfiles.log | Show-From “ERROR”, “SUCCESS”

B.

Get-Content –ifmatch \Server\FTPFolder\Logfiles\ftpfiles.log | Copy-Marked “ERROR”, “SUCCESS”

C.

Get-Content –Directory \Server\FTPFolder\Logfiles\ftpfiles.log | Export-Result “ERROR”, “SUCCESS”

D.

Get-Content –Path \Server\FTPFolder\Logfiles\ftpfiles.log | Select-String “ERROR”, “SUCCESS”

Question 12

Refer to the exhibit.

Question # 12

Which element in this email is an indicator of attack?

Options:

A.

IP Address: 202.142.155.218

B.

content-Type: multipart/mixed

C.

attachment: “Card-Refund”

D.

subject: “Service Credit Card”

Question 13

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

Options:

A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

Question 14

Refer to the exhibit.

Question # 14

According to the SNORT alert, what is the attacker performing?

Options:

A.

brute-force attack against the web application user accounts

B.

XSS attack against the target webserver

C.

brute-force attack against directories and files on the target webserver

D.

SQL injection attack against the target webserver

Question 15

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

Options:

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Question 16

Refer to the exhibit.

Question # 16

What should an engineer determine from this Wireshark capture of suspicious network traffic?

Options:

A.

There are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections.

B.

There are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure.

C.

There are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure.

D.

There are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure.

Question 17

Refer to the exhibit.

Question # 17

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Options:

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Question 18

What is the goal of an incident response plan?

Options:

A.

to identify critical systems and resources in an organization

B.

to ensure systems are in place to prevent an attack

C.

to determine security weaknesses and recommend solutions

D.

to contain an attack and prevent it from spreading

Question 19

Refer to the exhibit.

Question # 19

An engineer is analyzing a TCP stream in Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream?

Options:

A.

It is redirecting to a malicious phishing website

B.

It is exploiting redirect vulnerability

C.

It is requesting authentication on the user site.

D.

It is sharing access to files and printers.

Question 20

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

Options:

A.

An engineer should check the list of usernames currently logged in by running the command$ who | cut – d’ ‘ -f1| sort | uniq

B.

An engineer should check the server’s processes by running commandsps -auxandsudo ps -a

C.

An engineer should check the services on the machine by running the commandservice -status-all

D.

An engineer should check the last hundred entries of a web server with the commandsudo tail -100 /var/log/apache2/access.log

Question 21

An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadership requested a report that identifies the problems that triggered the incident and the security team’s approach to address these problems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?

Options:

A.

impact and flow

B.

cause and effect

C.

risk and RPN

D.

motive and factors

Question 22

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

Options:

A.

FILE-OFFICE Microsoft Graphics buffer overflow

B.

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.

FILE-OFFICE Microsoft Graphics remote code execution attempt

Question 23

What is an issue with digital forensics in cloud environments, from a security point of view?

Options:

A.

weak cloud computer specifications

B.

lack of logs

C.

no physical access to the hard drive

D.

network access instability

Question 24

Refer to the exhibit.Question # 24

What is occurring?

Options:

A.

Obfuscated scripts are getting executed on the victim machine.

B.

Malware is modifying the registry keys.

C.

RDP is used to move laterally to systems within the victim environment.

D.

The threat actor creates persistence by creating a repeatable task.

Question 25

A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s behavior. Which logs should be reviewed next to evaluate this file further?

Options:

A.

email security appliance

B.

DNS server

C.

Antivirus solution

D.

network device

Question 26

A security team received an alert of suspicious activity on a user’s Internet browser. The user’s anti-virus software indicated that the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should be taken by the security analyst with the executable file for further analysis? (Choose two.)

Options:

A.

Evaluate the process activity in Cisco Umbrella.

B.

Analyze the TCP/IP Streams in Cisco Secure Malware Analytics (Threat Grid).

C.

Evaluate the behavioral indicators in Cisco Secure Malware Analytics (Threat Grid).

D.

Analyze the Magic File type in Cisco Umbrella.

E.

Network Exit Localization in Cisco Secure Malware Analytics (Threat Grid).

Question 27

Which tool is used for reverse engineering malware?

Options:

A.

Ghidra

B.

SNORT

C.

Wireshark

D.

NMAP

Question 28

Question # 28

Refer to the exhibit. A network administrator creates an Apache log parser by using Python. What needs to be added in the box where the code is missing to accomplish the requirement?

Options:

A.

r'\d(1,3),\d(1.3),\d{13}.df{1,3}'

B.

r'*\b'

C.

r''\b{1-9}[0-9}\b'

D.

r'\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}'

Question 29

Refer to the exhibit.

Question # 29

A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a possible indication of an attack because the SSHD system just went live and there should be nobody using it. Which action should the analyst take to respond to the alert?

Options:

A.

Investigate the alert by checking SSH logs and correlating with other relevant data in SIEM.

B.

Reset the admin password in SSHD to prevent unauthorized access to the system at scale.

C.

Ignore the alert and continue monitoring for further activity because the system was just implemented.

D.

Immediately block the IP address 192.168.1.100 from accessing the SSHD environment.

Question 30

Drag and drop the capabilities on the left onto the Cisco security solutions on the right.

Question # 30

Options:

Question 31

What are two features of Cisco Secure Endpoint? (Choose two.)

Options:

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

Question 32

Refer to the exhibit.

Question # 32

What do these artifacts indicate?

Options:

A.

An executable file is requesting an application download.

B.

A malicious file is redirecting users to different domains.

C.

The MD5 of a file is identified as a virus and is being blocked.

D.

A forged DNS request is forwarding users to malicious websites.

Question 33

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

Options:

A.

encryption

B.

tunneling

C.

obfuscation

D.

poisoning

Question 34

An engineer must advise on how YARA rules can enhance detection capabilities. What can YARA rules be used to identify?

Options:

A.

suspicious web requests

B.

suspicious files that match specific conditions

C.

suspicious emails and possible phishing attempts

D.

network traffic patterns

Page: 1 / 12
Total 115 questions