Pass the Cisco CyberOps Professional 300-215 Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Refer to the exhibit.

Question # 11

A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a possible indication of an attack because the SSHD system just went live and there should be nobody using it. Which action should the analyst take to respond to the alert?

Options:

A.

Investigate the alert by checking SSH logs and correlating with other relevant data in SIEM.


B.

Reset the admin password in SSHD to prevent unauthorized access to the system at scale.


C.

Ignore the alert and continue monitoring for further activity because the system was just implemented.


D.

Immediately block the IP address 192.168.1.100 from accessing the SSHD environment.


Expert Solution
Questions # 12:

An incident responder reviews a log entry that shows a Microsoft Word process initiating an outbound network connection followed by PowerShell execution with obfuscated commands. Considering the machine's role in a sensitive data department, what is the most critical action for the responder to take next to analyze this output for potential indicators of compromise?

Options:

A.

Compare the metadata of the Microsoft Word document with known templates to verify its authenticity.


B.

Examine the network destination of the outbound connection to assess the credibility and categorize the traffic.


C.

Conduct a behavioral analysis of the PowerShell execution pattern and deobfuscate the commands to assess malicious intent.


D.

Correlate the time of the outbound network connection with the user's activity log to establish a usage pattern.


Expert Solution
Questions # 13:

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

Options:

A.

encryption


B.

tunneling


C.

obfuscation


D.

poisoning


Expert Solution
Questions # 14:

An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?

Options:

A.

phishing email sent to the victim


B.

alarm raised by the SIEM


C.

information from the email header


D.

alert identified by the cybersecurity team


Expert Solution
Questions # 15:

An analyst finds .xyz files of unknown origin that are large and undetected by antivirus. What action should be taken next?

Options:

A.

Isolate the files and perform a deeper heuristic analysis to detect potential unknown malware or data exfiltration payloads.


B.

Rename the file extensions to .txt to enable easier opening and review by team members.


C.

Delete the files immediately to prevent potential risks.


D.

Move the files to a less secure network segment for analysis.


Expert Solution
Questions # 16:

Refer to the exhibit.

Question # 16

According to the SNORT alert, what is the attacker performing?

Options:

A.

brute-force attack against the web application user accounts


B.

XSS attack against the target webserver


C.

brute-force attack against directories and files on the target webserver


D.

SQL injection attack against the target webserver


Expert Solution
Questions # 17:

Refer to the exhibit.

Question # 17

Which two determinations should be made about the attack from the Apache access logs? (Choose two.)

Options:

A.

The attacker used r57 exploit to elevate their privilege.


B.

The attacker uploaded the WordPress file manager trojan.


C.

The attacker performed a brute force attack against WordPress and used SQL injection against the backend database.


D.

The attacker used the WordPress file manager plugin to upload r57.php.


E.

The attacker logged on normally to WordPress admin page.


Expert Solution
Questions # 18:

Refer to the exhibit.

Question # 18

An alert came with a potentially suspicious activity from a machine in HR department. Which two IOCs should the security analyst flag? (Choose two.)

Options:

A.

powershell.exe used on HR machine


B.

cmd.exe executing from \Device\HarddiskVolume3\


C.

WScript.exe initiated by powershell.exe


D.

cmd.exe starting powershell.exe with Base64 conversion


E.

WScript.exe acting as a parent of cmd.exe


Expert Solution
Questions # 19:

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

Options:

A.

An engineer should check the list of usernames currently logged in by running the command$ who | cut – d’ ‘ -f1| sort | uniq


B.

An engineer should check the server’s processes by running commandsps -auxandsudo ps -a


C.

An engineer should check the services on the machine by running the commandservice -status-all


D.

An engineer should check the last hundred entries of a web server with the commandsudo tail -100 /var/log/apache2/access.log


Expert Solution
Questions # 20:

A security team is notified from a Cisco ESA solution that an employee received an advertising email with an attached .pdf extension file. The employee opened the attachment, which appeared to be an empty document. The security analyst cannot identify clear signs of compromise but reviews running processes and determines that PowerShell.exe was spawned by CMD.exe with a grandparent AcroRd32.exe process. Which two actions should be taken to resolve this issue? (Choose two.)

Options:

A.

Upload the .pdf file to Cisco Threat Grid and analyze suspicious activity in depth.


B.

No action is required because this behavior is standard for .pdf files.


C.

Check the Windows Event Viewer for security logs about the incident.


D.

Quarantine this workstation for further investigation, as this event is an indication of suspicious activity.


E.

Investigate the reputation of the sender address and temporarily block all communications with this email domain.


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions