Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Exam Practice Test

Page: 1 / 13
Total 131 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

Which two actions should be taken based on the intelligence information? (Choose two.)

Options:

A.

Block network access to all .shop domains

B.

Add a SIEM rule to alert on connections to identified domains.

C.

Use the DNS server to block hole all .shop requests.

D.

Block network access to identified domains.

E.

Route traffic from identified domains to block hole.

Question 2

An investigator notices that GRE packets are going undetected over the public network. What is occurring?

Options:

A.

encryption

B.

tunneling

C.

decryption

D.

steganography

Question 3

A new zero-day vulnerability is discovered in the web application. Vulnerability does not require physical access and can be exploited remotely. Attackers are exploiting the new vulnerability by submitting a form with malicious content that grants them access to the server. After exploitation, attackers delete the log files to hide traces. Which two actions should the security engineer take next? (Choose two.)

Options:

A.

Validate input upon submission.

B.

Block connections on port 443.

C.

Install antivirus.

D.

Update web application to the latest version.

E.

Enable file integrity monitoring.

Question 4

Which type of record enables forensics analysts to identify fileless malware on Windows machines?

Options:

A.

IIS logs

B.

file event records

C.

PowerShell event logs

D.

network records

Question 5

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?

Options:

A.

spoofing

B.

obfuscation

C.

tunneling

D.

steganography

Question 6

Over the last year, an organization’s HR department has accessed data from its legal department on the last day of each month to create a monthly activity report. An engineer is analyzing suspicious activity alerted by a threat intelligence platform that an authorized user in the HR department has accessed legal data daily for the last week. The engineer pulled the network data from the legal department’s shared folders and discovered above average-size data dumps. Which threat actor is implied from these artifacts?

Options:

A.

privilege escalation

B.

internal user errors

C.

malicious insider

D.

external exfiltration

Question 7

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

Options:

A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

Question 8

A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?

Options:

A.

Reset the reporting user's account and enable multifactor authentication.

B.

Create a detailed incident report and share it with top management.

C.

Find any other emails coming from the IP address ranges that are managed by XYZCloud.

D.

Delete email from user mailboxes and update the incident ticket with lessons learned.

Question 9

Refer to the exhibit.

Question # 9

According to the SNORT alert, what is the attacker performing?

Options:

A.

brute-force attack against the web application user accounts

B.

XSS attack against the target webserver

C.

brute-force attack against directories and files on the target webserver

D.

SQL injection attack against the target webserver

Question 10

Which tool is used for reverse engineering malware?

Options:

A.

Ghidra

B.

SNORT

C.

Wireshark

D.

NMAP

Question 11

An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ProfileList

C.

HKEY_CURRENT_USER\Software\Classes\Winlog

D.

HKEY_LOCAL_MACHINES\SOFTWARE\Microsoft\WindowsNT\CurrentUser

Question 12

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Question 13

What can the blue team achieve by using Hex Fiend against a piece of malware?

Options:

A.

Use the hex data to define patterns in VARA rules.

B.

Read the hex data and transmognify into a readable ELF format

C.

Use the hex data to modify BE header to read the file.

D.

Read the hex data and decrypt payload via access key.

Question 14

Refer to the exhibit.

Question # 14

Which two actions should be taken as a result of this information? (Choose two.)

Options:

A.

Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

B.

Block all emails sent from an @state.gov address.

C.

Block all emails with pdf attachments.

D.

Block emails sent from Admin@state.net with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

E.

Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

Question 15

Refer to the exhibit.

Question # 15

Which two actions should be taken as a result of this information? (Choose two.)

Options:

A.

Block any URLs in received emails.

B.

Blacklist IPs 164.90.168.78 and 199.19.224.83.

C.

Block any access to and from domain apponline-8473.xyz.

D.

Block any malicious activity with xfe-threat-score-10.

E.

Block all emails sent from malicious domain apponline-8473.xyz.

Question 16

A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?

Options:

A.

Cisco Secure Firewall ASA

B.

Cisco Secure Firewall Threat Defense (Firepower)

C.

Cisco Secure Email Gateway (ESA)

D.

Cisco Secure Web Appliance (WSA)

Question 17

Refer to the exhibit.

Question # 17

Which encoding technique is represented by this HEX string?

Options:

A.

Unicode

B.

Binary

C.

Base64

D.

Charcode

Question 18

Refer to the exhibit.

Question # 18

A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a possible indication of an attack because the SSHD system just went live and there should be nobody using it. Which action should the analyst take to respond to the alert?

Options:

A.

Investigate the alert by checking SSH logs and correlating with other relevant data in SIEM.

B.

Reset the admin password in SSHD to prevent unauthorized access to the system at scale.

C.

Ignore the alert and continue monitoring for further activity because the system was just implemented.

D.

Immediately block the IP address 192.168.1.100 from accessing the SSHD environment.

Question 19

Question # 19

Refer to the exhibit. A security analyst notices that a web application running on NGINX is generating an unusual number of log messages. The application is operational and reachable. What is the cause of this activity?

Options:

A.

botnet infection

B.

directory fuzzing

C.

DDoS attack

D.

SQL injection

Question 20

Question # 20

Options:

A.

Destination IP 51.38.124.206 is identified as malicious

B.

MD5 D634c0ba04a4e9140761cbd7b057t>8c5 is identified as malicious

C.

Path http-req-51.38.124.206-80-14-1 is benign

D.

The stream must be analyzed further via the pcap file

Question 21

An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Options:

A.

controlled folder access

B.

removable device restrictions

C.

signed macro requirements

D.

firewall rules creation

E.

network access control

Question 22

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.

analysis of the organization's network architecture and security infrastructure

C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware

Question 23

Refer to the exhibit.

Question # 23

A cybersecurity analyst is presented with the snippet of code used by the threat actor and left behind during the latest incident and is asked to determine its type based on its structure and functionality. What is the type of code being examined?

Options:

A.

simple client-side script for downloading other elements

B.

basic web crawler for indexing website content

C.

network monitoring script for capturing incoming traffic

D.

socket programming listener for TCP/IP communication

Question 24

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

Options:

A.

/var/log/access.log

B.

/var/log/messages.log

C.

/var/log/httpd/messages.log

D.

/var/log/httpd/access.log

Question 25

During a routine inspection of system logs, a security analyst notices an entry where Microsoft Word initiated a PowerShell command with encoded arguments. Given that the user's role does not involve scripting or advanced document processing, which action should the analyst take to analyze this output for potential indicators of compromise?

Options:

A.

Monitor the Microsoft Word startup times to ensure they align with business hours.

B.

Confirm that the Microsoft Word license is valid and the application is updated to the latest version.

C.

Validate the frequency of PowerShell usage across all hosts to establish a baseline.

D.

Review the encoded PowerShell arguments to decode and determine the intent of the script.

Question 26

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

Options:

A.

anti-malware software

B.

data and workload isolation

C.

centralized user management

D.

intrusion prevention system

E.

enterprise block listing solution

Question 27

Which technique exemplifies an antiforensic technique?

Options:

A.

steganalysis

B.

data replication

C.

stepheorology

D.

steganography

Question 28

Refer to the exhibit.

Question # 28

What is the indicator of compromise?

Options:

A.

SHA256 file hash

B.

indicator ID: malware--a932fcc6-e032-476c-826f-cb970a569bce

C.

indicator type: malicious-activity

D.

MD5 file hash

Question 29

Refer to the exhibit.

Question # 29

The application x-dosexec with hash 691c65e4fb1d19f82465df1d34ad51aaeceba14a78167262dc7b2840a6a6aa87 is reported as malicious and labeled as "Trojan.Generic" by the threat intelligence tool. What is considered an indicator of compromise?

Options:

A.

modified registry

B.

hooking

C.

process injection

D.

data compression

Question 30

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

Options:

A.

An engineer should check the list of usernames currently logged in by running the command $ who | cut – d’ ‘ -f1| sort | uniq

B.

An engineer should check the server’s processes by running commands ps -aux and sudo ps -a

C.

An engineer should check the services on the machine by running the command service -status-all

D.

An engineer should check the last hundred entries of a web server with the command sudo tail -100 /var/log/apache2/access.log

Question 31

An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?

Options:

A.

phishing email sent to the victim

B.

alarm raised by the SIEM

C.

information from the email header

D.

alert identified by the cybersecurity team

Question 32

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

Options:

A.

Review the database.log file in the program files directory for database errors

B.

Examine the system.cfg file in the Windows directory for improper system configurations

C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration

D.

Check the Memory.dmp file in the Windows directory for memory leak indications

Question 33

An engineer must advise on how YARA rules can enhance detection capabilities. What can YARA rules be used to identify?

Options:

A.

suspicious web requests

B.

suspicious files that match specific conditions

C.

suspicious emails and possible phishing attempts

D.

network traffic patterns

Question 34

Rotor to the exhibit.

Question # 34

A cybersecurity analyst must analyst the logs from an Apache server for the client. The concern is that an offboarded employee home IP address was potentially used to access the company web server via a still active VPN connection Based on this log entry, what should an analyst conclude?

Options:

A.

An ex employee planted malware on the server

B.

A file was downloaded from the server

C.

A worker uploaded a file to the server

D.

An employee has accessed a web page on the server

Question 35

Question # 35

Options:

A.

Evaluate the artifacts in Cisco Secure Malware Analytics.

B.

Evaluate the file activity in Cisco Umbrella.

C.

Analyze the registry activity section in Cisco Umbrella.

D.

Analyze the activity paths in Cisco Secure Malware Analytics.

Question 36

Which tool conducts memory analysis?

Options:

A.

MemDump

B.

Sysinternals Autoruns

C.

Volatility

D.

Memoryze

Question 37

What is the purpose of YARA rules in malware analysis and now do the rules atd in identifying, classifying, and documenting malware?

Options:

A.

They automatically remove malware from an infected system while documenting the behavior of the APT

B.

They encrypt identified malware on a system to prevent execution of files with the same classification

C.

They create a backup of identified malware and classify it according to its origin and source

D.

They use specific static patterns and attributes to identify and classify matware, characterizing its nature

Question 38

A security team is notified from a Cisco ESA solution that an employee received an advertising email with an attached .pdf extension file. The employee opened the attachment, which appeared to be an empty document. The security analyst cannot identify clear signs of compromise but reviews running processes and determines that PowerShell.exe was spawned by CMD.exe with a grandparent AcroRd32.exe process. Which two actions should be taken to resolve this issue? (Choose two.)

Options:

A.

Upload the .pdf file to Cisco Threat Grid and analyze suspicious activity in depth.

B.

No action is required because this behavior is standard for .pdf files.

C.

Check the Windows Event Viewer for security logs about the incident.

D.

Quarantine this workstation for further investigation, as this event is an indication of suspicious activity.

E.

Investigate the reputation of the sender address and temporarily block all communications with this email domain.

Question 39

What is an antiforensic technique to cover a digital footprint?

Options:

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Page: 1 / 13
Total 131 questions