Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Exam Practice Test

Page: 1 / 12
Total 115 questions

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$49  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $119.99
Question 1

A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?

Options:

A.

root cause

B.

intrusion prevention

C.

incident response

D.

attack surface

Question 2

Refer to the exhibit.

Which type of code is being used?

Options:

A.

Shell

B.

VBScript

C.

BASH

D.

Python

Question 3

Refer to the exhibit.

What is the indicator of compromise?

Options:

A.

SHA256 file hash

B.

indicator ID: malware--a932fcc6-e032-476c-826f-cb970a569bce

C.

indicator type: malicious-activity

D.

MD5 file hash

Question 4

A security team received an alert of suspicious activity on a user’s Internet browser. The user’s anti-virus software indicated that the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should be taken by the security analyst with the executable file for further analysis? (Choose two.)

Options:

A.

Evaluate the process activity in Cisco Umbrella.

B.

Analyze the TCP/IP Streams in Cisco Secure Malware Analytics (Threat Grid).

C.

Evaluate the behavioral indicators in Cisco Secure Malware Analytics (Threat Grid).

D.

Analyze the Magic File type in Cisco Umbrella.

E.

Network Exit Localization in Cisco Secure Malware Analytics (Threat Grid).

Question 5

A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?

Options:

A.

Reset the reporting user's account and enable multifactor authentication.

B.

Create a detailed incident report and share it with top management.

C.

Find any other emails coming from the IP address ranges that are managed by XYZCloud.

D.

Delete email from user mailboxes and update the incident ticket with lessons learned.

Question 6

Options:

A.

Destination IP 51.38.124.206 is identified as malicious

B.

MD5 D634c0ba04a4e9140761cbd7b057t>8c5 is identified as malicious

C.

Path http-req-51.38.124.206-80-14-1 is benign

D.

The stream must be analyzed further via the pcap file

Question 7

Which information is provided about the object file by the “-h” option in the objdump line commandobjdump –b oasys –m vax –h fu.o?

Options:

A.

bfdname

B.

debugging

C.

help

D.

headers

Question 8

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

Options:

A.

verify the breadth of the attack

B.

collect logs

C.

request packet capture

D.

remove vulnerabilities

E.

scan hosts with updated signatures

Question 9

multiple machines behave abnormally. A sandbox analysis reveals malware. What must the administrator determine next?

Options:

A.

if Patient 0 still demonstrates suspicious behavior

B.

source code of the malicious attachment

C.

if the file in Patient 0 is encrypted

D.

if Patient 0 tried to connect to another workstation

Question 10

A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)

Options:

A.

Introduce a priority rating for incident response workloads.

B.

Provide phishing awareness training for the full security team.

C.

Conduct a risk audit of the incident response workflow.

D.

Create an executive team delegation plan.

E.

Automate security alert timeframes with escalation triggers.

Question 11

Which magic byte indicates that an analyzed file is a pdf file?

Options:

A.

cGRmZmlsZQ

B.

706466666

C.

255044462d

D.

0a0ah4cg

Question 12

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.

analysis of the organization's network architecture and security infrastructure

C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware

Question 13

Refer to the exhibit.

Options:

A.

hex encoding

B.

metamorphic encoding

C.

ASCII85 encoding

D.

Base64 encoding

Question 14

What is the steganography anti-forensics technique?

Options:

A.

hiding a section of a malicious file in unused areas of a file

B.

changing the file header of a malicious file to another file type

C.

sending malicious files over a public network by encapsulation

D.

concealing malicious files in ordinary or unsuspecting places

Question 15

Which tool should be used for dynamic malware analysis?

Options:

A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

Question 16

Refer to the exhibit.

Which type of code created the snippet?

Options:

A.

VB Script

B.

Python

C.

PowerShell

D.

Bash Script

Question 17

Refer to the exhibit.

A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event?

Options:

A.

DNS spoofing; encrypt communication protocols

B.

SYN flooding; block malicious packets

C.

ARP spoofing; configure port security

D.

MAC flooding; assign static entries

Question 18

Which type of record enables forensics analysts to identify fileless malware on Windows machines?

Options:

A.

IIS logs

B.

file event records

C.

PowerShell event logs

D.

network records

Question 19

Refer to the exhibit.

A cybersecurity analyst is presented with the snippet of code used by the threat actor and left behind during the latest incident and is asked to determine its type based on its structure and functionality. What is the type of code being examined?

Options:

A.

simple client-side script for downloading other elements

B.

basic web crawler for indexing website content

C.

network monitoring script for capturing incoming traffic

D.

socket programming listener for TCP/IP communication

Question 20

Refer to the exhibit.

What do these artifacts indicate?

Options:

A.

An executable file is requesting an application download.

B.

A malicious file is redirecting users to different domains.

C.

The MD5 of a file is identified as a virus and is being blocked.

D.

A forged DNS request is forwarding users to malicious websites.

Question 21

What can the blue team achieve by using Hex Fiend against a piece of malware?

Options:

A.

Use the hex data to define patterns in VARA rules.

B.

Read the hex data and transmognify into a readable ELF format

C.

Use the hex data to modify BE header to read the file.

D.

Read the hex data and decrypt payload via access key.

Question 22

Options:

A.

Initiate a connection to 23.1.4.14 over port 8443.

B.

Generate a Windows executable file.

C.

Open the Mozilla Firefox browser.

D.

Validate the SSL certificate for 23.1.4.14.

Question 23

Which two tools conduct network traffic analysis in the absence of a graphical user interface? (Choose two.)

Options:

A.

Network Extractor

B.

TCPdump

C.

TCPshark

D.

Wireshark

E.

NetworkDebuggerPro

Question 24

Refer to the exhibit.

What does the exhibit indicate?

Options:

A.

The new file is created under the Software\Classes disk folder.

B.

A UAC bypass is created by modifying user-accessible registry settings.

C.

A scheduled task named "DelegateExecute" is created.

D.

The shell software is modified via PowerShell.

Question 25

What are two features of Cisco Secure Endpoint? (Choose two.)

Options:

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

Question 26

What is the goal of an incident response plan?

Options:

A.

to identify critical systems and resources in an organization

B.

to ensure systems are in place to prevent an attack

C.

to determine security weaknesses and recommend solutions

D.

to contain an attack and prevent it from spreading

Question 27

What is a use of TCPdump?

Options:

A.

to analyze IP and other packets

B.

to view encrypted data fields

C.

to decode user credentials

D.

to change IP ports

Question 28

Refer to the exhibit.

Which two actions should be taken based on the intelligence information? (Choose two.)

Options:

A.

Block network access to all .shop domains

B.

Add a SIEM rule to alert on connections to identified domains.

C.

Use the DNS server to block hole all .shop requests.

D.

Block network access to identified domains.

E.

Route traffic from identified domains to block hole.

Question 29

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

Options:

A.

/var/log/access.log

B.

/var/log/messages.log

C.

/var/log/httpd/messages.log

D.

/var/log/httpd/access.log

Question 30

An incident responder reviews a log entry that shows a Microsoft Word process initiating an outbound network connection followed by PowerShell execution with obfuscated commands. Considering the machine's role in a sensitive data department, what is the most critical action for the responder to take next to analyze this output for potential indicators of compromise?

Options:

A.

Compare the metadata of the Microsoft Word document with known templates to verify its authenticity.

B.

Examine the network destination of the outbound connection to assess the credibility and categorize the traffic.

C.

Conduct a behavioral analysis of the PowerShell execution pattern and deobfuscate the commands to assess malicious intent.

D.

Correlate the time of the outbound network connection with the user's activity log to establish a usage pattern.

Question 31

An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Options:

A.

controlled folder access

B.

removable device restrictions

C.

signed macro requirements

D.

firewall rules creation

E.

network access control

Question 32

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Question 33

An analyst finds .xyz files of unknown origin that are large and undetected by antivirus. What action should be taken next?

Options:

A.

Isolate the files and perform a deeper heuristic analysis to detect potential unknown malware or data exfiltration payloads.

B.

Rename the file extensions to .txt to enable easier opening and review by team members.

C.

Delete the files immediately to prevent potential risks.

D.

Move the files to a less secure network segment for analysis.

Question 34

Refer to the exhibit.

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Options:

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Page: 1 / 12
Total 115 questions