Pass the Cisco CyberOps Professional 300-215 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log


B.

/var/log/vmksummary.log


C.

/var/log/shell.log


D.

/var/log/general/log


Questions # 2:

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

Options:

A.

/var/log/access.log


B.

/var/log/messages.log


C.

/var/log/httpd/messages.log


D.

/var/log/httpd/access.log


Questions # 3:

Refer to the exhibit.

Question # 3

Which type of code is being used?

Options:

A.

Shell


B.

VBScript


C.

BASH


D.

Python


Questions # 4:

Refer to the exhibit.

Question # 4

According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

Options:

A.

Domain name: iraniansk.com


B.

Server: nginx


C.

Hash value: 5f31ab113af08=1597090577


D.

filename= “Fy.exe”


E.

Content-Type: application/octet-stream


Questions # 5:

Question # 5

Refer to the exhibit. A security analyst notices that a web application running on NGINX is generating an unusual number of log messages. The application is operational and reachable. What is the cause of this activity?

Options:

A.

botnet infection


B.

directory fuzzing


C.

DDoS attack


D.

SQL injection


Questions # 6:

Refer to the exhibit.

Question # 6

An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

Options:

A.

data obfuscation


B.

reconnaissance attack


C.

brute-force attack


D.

log tampering


Questions # 7:

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks


B.

analysis of the organization's network architecture and security infrastructure


C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers


D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware


Questions # 8:

Refer to the exhibit.

Question # 8

Which determination should be made by a security analyst?

Options:

A.

An email was sent with an attachment named “Grades.doc.exe”.


B.

An email was sent with an attachment named “Grades.doc”.


C.

An email was sent with an attachment named “Final Report.doc”.


D.

An email was sent with an attachment named “Final Report.doc.exe”.


Questions # 9:

Refer to the exhibit.

Question # 9

What is the IOC threat and URL in this STIX JSON snippet?

Options:

A.

malware; ‘http://x4z9arb.cn/4712/’


B.

malware; x4z9arb backdoor


C.

x4z9arb backdoor;http://x4z9arb.cn/4712/


D.

malware; malware--162d917e-766f-4611-b5d6-652791454fca


E.

stix; ‘http://x4z9arb.cn/4712/’


Questions # 10:

Refer to the exhibit.

Question # 10

What should an engineer determine from this Wireshark capture of suspicious network traffic?

Options:

A.

There are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections.


B.

There are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure.


C.

There are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure.


D.

There are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure.


Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions