Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Questions and Answers

Questions 4

A security team received an alert of suspicious activity on a user’s Internet browser. The user’s anti-virus software indicated that the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should be taken by the security analyst with the executable file for further analysis? (Choose two.)

Options:

A.

Evaluate the process activity in Cisco Umbrella.

B.

Analyze the TCP/IP Streams in Cisco Secure Malware Analytics (Threat Grid).

C.

Evaluate the behavioral indicators in Cisco Secure Malware Analytics (Threat Grid).

D.

Analyze the Magic File type in Cisco Umbrella.

E.

Network Exit Localization in Cisco Secure Malware Analytics (Threat Grid).

Buy Now
Questions 5

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

Options:

A.

Review the database.log file in the program files directory for database errors

B.

Examine the system.cfg file in the Windows directory for improper system configurations

C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration

D.

Check the Memory.dmp file in the Windows directory for memory leak indications

Buy Now
Questions 6

Refer to the exhibit.

Which type of code is shown?

Options:

A.

VBScript

B.

shell

C.

Bash

D.

Python

Buy Now
Questions 7

Refer to the exhibit.

According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

Options:

A.

Domain name: iraniansk.com

B.

Server: nginx

C.

Hash value: 5f31ab113af08=1597090577

D.

filename= “Fy.exe”

E.

Content-Type: application/octet-stream

Buy Now
Questions 8

What can the blue team achieve by using Hex Fiend against a piece of malware?

Options:

A.

Use the hex data to define patterns in VARA rules.

B.

Read the hex data and transmognify into a readable ELF format

C.

Use the hex data to modify BE header to read the file.

D.

Read the hex data and decrypt payload via access key.

Buy Now
Questions 9

During a routine inspection of system logs, a security analyst notices an entry where Microsoft Word initiated a PowerShell command with encoded arguments. Given that the user's role does not involve scripting or advanced document processing, which action should the analyst take to analyze this output for potential indicators of compromise?

Options:

A.

Monitor the Microsoft Word startup times to ensure they align with business hours.

B.

Confirm that the Microsoft Word license is valid and the application is updated to the latest version.

C.

Validate the frequency of PowerShell usage across all hosts to establish a baseline.

D.

Review the encoded PowerShell arguments to decode and determine the intent of the script.

Buy Now
Questions 10

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

Options:

A.

verify the breadth of the attack

B.

collect logs

C.

request packet capture

D.

remove vulnerabilities

E.

scan hosts with updated signatures

Buy Now
Questions 11

During an overnight shift, a cybersecurity team at a global trading firm detects irregular activity The network intrusion system flags an encrypted traffic spike from high-value transaction servers to an anonymous Tor exit node Simultaneously, internal surveillance tools report unusual database queries and access patterns resembling exfiltration techniques Which focused action should the team take first to analyze and address these potential security threats?

Options:

A.

Initiate immediate containment protocols tor transaction servers.

B.

Implement dynamic firewall rules to block suspicious outbound connections

C.

Cross-reference database access logs with user activity profiles

D.

Engage advanced decryption and anomaly analysis for the flagged traffic

Buy Now
Questions 12

A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?

Options:

A.

Reset the reporting user's account and enable multifactor authentication.

B.

Create a detailed incident report and share it with top management.

C.

Find any other emails coming from the IP address ranges that are managed by XYZCloud.

D.

Delete email from user mailboxes and update the incident ticket with lessons learned.

Buy Now
Questions 13

Refer to the exhibit.

Which type of code is being used?

Options:

A.

Shell

B.

VBScript

C.

BASH

D.

Python

Buy Now
Questions 14

Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?

Options:

A.

process injection

B.

privilege escalation

C.

GPO modification

D.

token manipulation

Buy Now
Questions 15

An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?

Options:

A.

phishing email sent to the victim

B.

alarm raised by the SIEM

C.

information from the email header

D.

alert identified by the cybersecurity team

Buy Now
Questions 16

Which two tools conduct network traffic analysis in the absence of a graphical user interface? (Choose two.)

Options:

A.

Network Extractor

B.

TCPdump

C.

TCPshark

D.

Wireshark

E.

NetworkDebuggerPro

Buy Now
Questions 17

Drag and drop the steps from the left into the order to perform forensics analysis of infrastructure networks on the right.

Options:

Buy Now
Questions 18

A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s behavior. Which logs should be reviewed next to evaluate this file further?

Options:

A.

email security appliance

B.

DNS server

C.

Antivirus solution

D.

network device

Buy Now
Questions 19

Refer to the exhibit. A security analyst notices that a web application running on NGINX is generating an unusual number of log messages. The application is operational and reachable. What is the cause of this activity?

Options:

A.

botnet infection

B.

directory fuzzing

C.

DDoS attack

D.

SQL injection

Buy Now
Questions 20

What is an antiforensic technique to cover a digital footprint?

Options:

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Buy Now
Questions 21

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

Options:

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Buy Now
Questions 22

Refer to the exhibit.

An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

Options:

A.

data obfuscation

B.

reconnaissance attack

C.

brute-force attack

D.

log tampering

Buy Now
Questions 23

A security analyst receives a notification from SIEM that an internal host has active connections to Tor exit nodes. The analyst investigates SIEM events related to the workstation and identifies that the host scans networks for servers with an opened TCP port 1433 An antivirus scan of the workstation does not determine any suspicious activity Which two actions must the analyst take to mitigate this behavior? (Choose two.)

Options:

A.

Configure SIEM alert rules to perform quick response and mitigation

B.

Block any connection to TCP port 1433 from external sources.

C.

Block Tor nodes via an NGFW and restrict access to SQL only from trusted sources

D.

Create a Cisco Secure Network Analytics notification rule to further investigate port scanning activity

E.

Deploy EDR and SOAR for automatic quarantine of actions from suspicious hosts

Buy Now
Questions 24

An incident response team is recommending changes after analyzing a recent compromise in which:

    a large number of events and logs were involved;

    team members were not able to identify the anomalous behavior and escalate it in a timely manner;

    several network systems were affected as a result of the latency in detection;

    security engineers were able to mitigate the threat and bring systems back to a stable state; and

    the issue reoccurred shortly after and systems became unstable again because the correct information was not gathered during the initial identification phase.

Which two recommendations should be made for improving the incident response process? (Choose two.)

Options:

A.

Formalize reporting requirements and responsibilities to update management and internal stakeholders throughout the incident-handling process effectively.

B.

Improve the mitigation phase to ensure causes can be quickly identified, and systems returned to a functioning state.

C.

Implement an automated operation to pull systems events/logs and bring them into an organizational context.

D.

Allocate additional resources for the containment phase to stabilize systems in a timely manner and reduce an attack’s breadth.

E.

Modify the incident handling playbook and checklist to ensure alignment and agreement on roles, responsibilities, and steps before an incident occurs.

Buy Now
Questions 25

Which issue is associated with gathering evidence from virtualized environments provided by major cloud vendors?

Options:

A.

increased data transparency provided by cloud vendors

B.

difficulty ensuring the integrity of data due to multitenancy

C.

reduced complexity in isolating and securing evidence

D.

simplified chain of custody due to virtualization

Buy Now
Questions 26

A security team needs to prevent a remote code execution vulnerability. The vulnerability can be exploited only by sending '${ string in the HTTP request. WAF rule is blocking '${', but system engineers detect that attackers are executing commands on the host anyway. Which action should the security team recommend?

Options:

A.

Enable URL decoding on WAF.

B.

Block incoming web traffic.

C.

Add two WAF rules to block 'S' and '{' characters separately.

D.

Deploy antimalware solution.

Buy Now
Questions 27

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

Options:

A.

FILE-OFFICE Microsoft Graphics buffer overflow

B.

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.

FILE-OFFICE Microsoft Graphics remote code execution attempt

Buy Now
Questions 28

Refer to the exhibit.

An alert came with a potentially suspicious activity from a machine in HR department. Which two IOCs should the security analyst flag? (Choose two.)

Options:

A.

powershell.exe used on HR machine

B.

cmd.exe executing from \Device\HarddiskVolume3\

C.

WScript.exe initiated by powershell.exe

D.

cmd.exe starting powershell.exe with Base64 conversion

E.

WScript.exe acting as a parent of cmd.exe

Buy Now
Questions 29

An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Options:

A.

controlled folder access

B.

removable device restrictions

C.

signed macro requirements

D.

firewall rules creation

E.

network access control

Buy Now
Questions 30

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.

analysis of the organization's network architecture and security infrastructure

C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware

Buy Now
Questions 31

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

Options:

A.

An engineer should check the list of usernames currently logged in by running the command $ who | cut – d’ ‘ -f1| sort | uniq

B.

An engineer should check the server’s processes by running commands ps -aux and sudo ps -a

C.

An engineer should check the services on the machine by running the command service -status-all

D.

An engineer should check the last hundred entries of a web server with the command sudo tail -100 /var/log/apache2/access.log

Buy Now
Questions 32

Refer to the exhibit.

What do these artifacts indicate?

Options:

A.

An executable file is requesting an application download.

B.

A malicious file is redirecting users to different domains.

C.

The MD5 of a file is identified as a virus and is being blocked.

D.

A forged DNS request is forwarding users to malicious websites.

Buy Now
Questions 33

What are YARA rules based upon?

Options:

A.

binary patterns

B.

HTML code

C.

network artifacts

D.

IP addresses

Buy Now
Questions 34

Refer to the exhibit.

Which two determinations should be made about the attack from the Apache access logs? (Choose two.)

Options:

A.

The attacker used r57 exploit to elevate their privilege.

B.

The attacker uploaded the WordPress file manager trojan.

C.

The attacker performed a brute force attack against WordPress and used SQL injection against the backend database.

D.

The attacker used the WordPress file manager plugin to upload r57.php.

E.

The attacker logged on normally to WordPress admin page.

Buy Now
Questions 35

An engineer must advise on how YARA rules can enhance detection capabilities. What can YARA rules be used to identify?

Options:

A.

suspicious web requests

B.

suspicious files that match specific conditions

C.

suspicious emails and possible phishing attempts

D.

network traffic patterns

Buy Now
Questions 36

Refer to the exhibit.

Which encoding technique is represented by this HEX string?

Options:

A.

Unicode

B.

Binary

C.

Base64

D.

Charcode

Buy Now
Questions 37

Refer to the exhibit.

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Options:

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Buy Now
Questions 38

During a routine security audit, an organization's security team detects an unusual spike in network traffic originating from one of their internal servers. Upon further investigation, the team discovered that the server was communicating with an external IP address known for hosting malicious content. The security team suspects that the server may have been compromised. As the incident response process begins, which two actions should be taken during the initial assessment phase of this incident? (Choose two.)

Options:

A.

Notify law enforcement agencies about the incident.

B.

Disconnect the compromised server from the network.

C.

Conduct a comprehensive forensic analysis of the server hard drive.

D.

Interview employees who have access to the server.

E.

Review the organization's network logs for any signs of intrusion.

Buy Now
Questions 39

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

Options:

A.

anti-malware software

B.

data and workload isolation

C.

centralized user management

D.

intrusion prevention system

E.

enterprise block listing solution

Buy Now
Exam Code: 300-215
Exam Name: Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
Last Update: Apr 7, 2026
Questions: 131
300-215 pdf

300-215 PDF

$28.5  $94.99
300-215 Engine

300-215 Testing Engine

$33  $109.99
300-215 PDF + Engine

300-215 PDF + Testing Engine

$43.5  $144.99