Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CyberOps Professional 300-215 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

Refer to the exhibit.

Question # 21

According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

Options:

A.

Domain name: iraniansk.com


B.

Server: nginx


C.

Hash value: 5f31ab113af08=1597090577


D.

filename= “Fy.exe”


E.

Content-Type: application/octet-stream


Expert Solution
Questions # 22:

Refer to the exhibit.

Question # 22

A cybersecurity analyst is presented with the snippet of code used by the threat actor and left behind during the latest incident and is asked to determine its type based on its structure and functionality. What is the type of code being examined?

Options:

A.

simple client-side script for downloading other elements


B.

basic web crawler for indexing website content


C.

network monitoring script for capturing incoming traffic


D.

socket programming listener for TCP/IP communication


Expert Solution
Questions # 23:

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

Options:

A.

anti-malware software


B.

data and workload isolation


C.

centralized user management


D.

intrusion prevention system


E.

enterprise block listing solution


Expert Solution
Questions # 24:

Refer to the exhibit.

Question # 24

What should be determined from this Apache log?

Options:

A.

A module named mod_ssl is needed to make SSL connections.


B.

The private key does not match with the SSL certificate.


C.

The certificate file has been maliciously modified


D.

The SSL traffic setup is improper


Expert Solution
Questions # 25:

A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?

Options:

A.

Cisco Secure Firewall ASA


B.

Cisco Secure Firewall Threat Defense (Firepower)


C.

Cisco Secure Email Gateway (ESA)


D.

Cisco Secure Web Appliance (WSA)


Expert Solution
Questions # 26:

What is an issue with digital forensics in cloud environments, from a security point of view?

Options:

A.

weak cloud computer specifications


B.

lack of logs


C.

no physical access to the hard drive


D.

network access instability


Expert Solution
Questions # 27:

Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?

Options:

A.

process injection


B.

privilege escalation


C.

GPO modification


D.

token manipulation


Expert Solution
Questions # 28:

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

Options:

A.

Review the database.log file in the program files directory for database errors


B.

Examine the system.cfg file in the Windows directory for improper system configurations


C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration


D.

Check the Memory.dmp file in the Windows directory for memory leak indications


Expert Solution
Questions # 29:

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

Options:

A.

endpoint detection and response


B.

secure email gateway


C.

data loss prevention


D.

intrusion prevention system


E.

web application firewall


Expert Solution
Questions # 30:

A cybersecurity analyst is analyzing a complex set of threat intelligence data from internal and external sources. Among the data, they discover a series of indicators, including patterns of unusual network traffic, a sudden increase in failed login attempts, and multiple instances of suspicious file access on the company's internal servers. Additionally, an external threat feed highlights that threat actors are actively targeting organizations in the same industry using ransomware. Which action should the analyst recommend?

Options:

A.

Advise on monitoring the situation passively because network traffic anomalies are coincidental and unrelated to the ransomware threat.


B.

Propose isolation of affected systems and activating the incident response plan because the organization is likely under attack by the new ransomware strain.


C.

Advocate providing additional training on secure login practices because the increase in failed login attempts is likely a result of employee error.


D.

Notify of no requirement for immediate action because the suspicious file access incidents are normal operational activities and do not indicate an ongoing threat.


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions