Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Questions 4

What are two features of Cisco Secure Endpoint? (Choose two.)

Options:

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

Buy Now
Questions 5

A security team received an alert of suspicious activity on a user’s Internet browser. The user’s anti-virus software indicated that the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should be taken by the security analyst with the executable file for further analysis? (Choose two.)

Options:

A.

Evaluate the process activity in Cisco Umbrella.

B.

Analyze the TCP/IP Streams in Cisco Secure Malware Analytics (Threat Grid).

C.

Evaluate the behavioral indicators in Cisco Secure Malware Analytics (Threat Grid).

D.

Analyze the Magic File type in Cisco Umbrella.

E.

Network Exit Localization in Cisco Secure Malware Analytics (Threat Grid).

Buy Now
Questions 6

300-215 Question 6

Options:

A.

Evaluate the artifacts in Cisco Secure Malware Analytics.

B.

Evaluate the file activity in Cisco Umbrella.

C.

Analyze the registry activity section in Cisco Umbrella.

D.

Analyze the activity paths in Cisco Secure Malware Analytics.

Buy Now
Questions 7

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

Options:

A.

endpoint detection and response

B.

secure email gateway

C.

data loss prevention

D.

intrusion prevention system

E.

web application firewall

Buy Now
Questions 8

An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ProfileList

C.

HKEY_CURRENT_USER\Software\Classes\Winlog

D.

HKEY_LOCAL_MACHINES\SOFTWARE\Microsoft\WindowsNT\CurrentUser

Buy Now
Questions 9

Drag and drop the steps from the left into the order to perform forensics analysis of infrastructure networks on the right.

300-215 Question 9

Options:

Buy Now
Questions 10

What is an antiforensic technique to cover a digital footprint?

Options:

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Buy Now
Questions 11

What is a use of TCPdump?

Options:

A.

to analyze IP and other packets

B.

to view encrypted data fields

C.

to decode user credentials

D.

to change IP ports

Buy Now
Questions 12

A security team is notified from a Cisco ESA solution that an employee received an advertising email with an attached .pdf extension file. The employee opened the attachment, which appeared to be an empty document. The security analyst cannot identify clear signs of compromise but reviews running processes and determines that PowerShell.exe was spawned by CMD.exe with a grandparent AcroRd32.exe process. Which two actions should be taken to resolve this issue? (Choose two.)

Options:

A.

Upload the .pdf file to Cisco Threat Grid and analyze suspicious activity in depth.

B.

No action is required because this behavior is standard for .pdf files.

C.

Check the Windows Event Viewer for security logs about the incident.

D.

Quarantine this workstation for further investigation, as this event is an indication of suspicious activity.

E.

Investigate the reputation of the sender address and temporarily block all communications with this email domain.

Buy Now
Questions 13

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

Options:

A.

An engineer should check the list of usernames currently logged in by running the command$ who | cut – d’ ‘ -f1| sort | uniq

B.

An engineer should check the server’s processes by running commandsps -auxandsudo ps -a

C.

An engineer should check the services on the machine by running the commandservice -status-all

D.

An engineer should check the last hundred entries of a web server with the commandsudo tail -100 /var/log/apache2/access.log

Buy Now
Questions 14

Refer to the exhibit.

300-215 Question 14

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Options:

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Buy Now
Questions 15

An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Options:

A.

controlled folder access

B.

removable device restrictions

C.

signed macro requirements

D.

firewall rules creation

E.

network access control

Buy Now
Questions 16

Refer to the exhibit.

300-215 Question 16

According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

Options:

A.

Domain name: iraniansk.com

B.

Server: nginx

C.

Hash value: 5f31ab113af08=1597090577

D.

filename= “Fy.exe”

E.

Content-Type: application/octet-stream

Buy Now
Questions 17

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

Options:

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Buy Now
Questions 18

An investigator notices that GRE packets are going undetected over the public network. What is occurring?

Options:

A.

encryption

B.

tunneling

C.

decryption

D.

steganography

Buy Now
Questions 19

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?

Options:

A.

spoofing

B.

obfuscation

C.

tunneling

D.

steganography

Buy Now
Questions 20

A cybersecurity analyst is analyzing a complex set of threat intelligence data from internal and external sources. Among the data, they discover a series of indicators, including patterns of unusual network traffic, a sudden increase in failed login attempts, and multiple instances of suspicious file access on the company's internal servers. Additionally, an external threat feed highlights that threat actors are actively targeting organizations in the same industry using ransomware. Which action should the analyst recommend?

Options:

A.

Advise on monitoring the situation passively because network traffic anomalies are coincidental and unrelated to the ransomware threat.

B.

Propose isolation of affected systems and activating the incident response plan because the organization is likely under attack by the new ransomware strain.

C.

Advocate providing additional training on secure login practices because the increase in failed login attempts is likely a result of employee error.

D.

Notify of no requirement for immediate action because the suspicious file access incidents are normal operational activities and do not indicate an ongoing threat.

Buy Now
Questions 21

What are YARA rules based upon?

Options:

A.

binary patterns

B.

HTML code

C.

network artifacts

D.

IP addresses

Buy Now
Questions 22

Drag and drop the cloud characteristic from the left onto the challenges presented for gathering evidence on the right.

300-215 Question 22

Options:

Buy Now
Questions 23

An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected application on their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic from this workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Which two actions should the engineer take? (Choose two.)

Options:

A.

Restore to a system recovery point.

B.

Replace the faulty CPU.

C.

Disconnect from the network.

D.

Format the workstation drives.

E.

Take an image of the workstation.

Buy Now
Questions 24

Refer to the exhibit.

300-215 Question 24

Which two actions should be taken based on the intelligence information? (Choose two.)

Options:

A.

Block network access to all .shop domains

B.

Add a SIEM rule to alert on connections to identified domains.

C.

Use the DNS server to block hole all .shop requests.

D.

Block network access to identified domains.

E.

Route traffic from identified domains to block hole.

Buy Now
Questions 25

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

Options:

A.

encryption

B.

tunneling

C.

obfuscation

D.

poisoning

Buy Now
Questions 26

Refer to the exhibit.

300-215 Question 26

An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hours prior. Which two indicators of compromise should be determined from this information? (Choose two.)

Options:

A.

unauthorized system modification

B.

privilege escalation

C.

denial of service attack

D.

compromised root access

E.

malware outbreak

Buy Now
Questions 27

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

Options:

A.

anti-malware software

B.

data and workload isolation

C.

centralized user management

D.

intrusion prevention system

E.

enterprise block listing solution

Buy Now
Questions 28

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

Options:

A.

deobfuscation

B.

XML injection

C.

string matching

D.

data diddling

Buy Now
Questions 29

Which type of record enables forensics analysts to identify fileless malware on Windows machines?

Options:

A.

IIS logs

B.

file event records

C.

PowerShell event logs

D.

network records

Buy Now
Questions 30

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Buy Now
Questions 31

What describes the first step in performing a forensic analysis of infrastructure network devices?

Options:

A.

immediately disconnecting the device from the network

B.

initiating an immediate full system scan

C.

resetting the device to factory settings and analyzing the difference

D.

producing an accurate, forensic-grade duplicate of the device's data

Buy Now
Questions 32

Refer to the exhibit.

300-215 Question 32

Options:

A.

hex encoding

B.

metamorphic encoding

C.

ASCII85 encoding

D.

Base64 encoding

Buy Now
Questions 33

Refer to the exhibit.

300-215 Question 33

An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?

Options:

A.

Delete the suspicious email with the attachment as the file is a shortcut extension and does not represent any threat.

B.

Upload the file to a virus checking engine to compare with well-known viruses as the file is a virus disguised as a legitimate extension.

C.

Quarantine the file within the endpoint antivirus solution as the file is a ransomware which will encrypt the documents of a victim.

D.

Open the file in a sandbox environment for further behavioral analysis as the file contains a malicious script that runs on execution.

Buy Now
Questions 34

Refer to the exhibit.

300-215 Question 34

An alert came with a potentially suspicious activity from a machine in HR department. Which two IOCs should the security analyst flag? (Choose two.)

Options:

A.

powershell.exe used on HR machine

B.

cmd.exe executing from \Device\HarddiskVolume3\

C.

WScript.exe initiated by powershell.exe

D.

cmd.exe starting powershell.exe with Base64 conversion

E.

WScript.exe acting as a parent of cmd.exe

Buy Now
Exam Code: 300-215
Exam Name: Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
Last Update: Jun 8, 2025
Questions: 115

PDF + Testing Engine

$61.25  $174.99

Testing Engine

$47.25  $134.99
buy now 300-215 testing engine

PDF (Q&A)

$40.25  $114.99
buy now 300-215 pdf