Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CyberOps Professional 300-215 Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

Options:

A.

deobfuscation


B.

XML injection


C.

string matching


D.

data diddling


Expert Solution
Questions # 32:

An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon


B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ProfileList


C.

HKEY_CURRENT_USER\Software\Classes\Winlog


D.

HKEY_LOCAL_MACHINES\SOFTWARE\Microsoft\WindowsNT\CurrentUser


Expert Solution
Questions # 33:

Which type of record enables forensics analysts to identify fileless malware on Windows machines?

Options:

A.

IIS logs


B.

file event records


C.

PowerShell event logs


D.

network records


Expert Solution
Questions # 34:

A cybersecurity analyst detects fileless malware activity on secure endpoints. What should be done next?

Options:

A.

Immediately quarantine the endpoints containing the suspicious files and consider the issue resolved


B.

Isolate the affected endpoints and conduct a detailed memory analysis to identify fileless malware execution.


C.

Delete the suspicious files and monitor the endpoints for any further signs of compromise.


D.

Share the findings with other government agencies for collaborative threat analysis and response.


Expert Solution
Questions # 35:

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

Options:

A.

/var/log/access.log


B.

/var/log/messages.log


C.

/var/log/httpd/messages.log


D.

/var/log/httpd/access.log


Expert Solution
Questions # 36:

An investigator notices that GRE packets are going undetected over the public network. What is occurring?

Options:

A.

encryption


B.

tunneling


C.

decryption


D.

steganography


Expert Solution
Questions # 37:

A new zero-day vulnerability is discovered in the web application. Vulnerability does not require physical access and can be exploited remotely. Attackers are exploiting the new vulnerability by submitting a form with malicious content that grants them access to the server. After exploitation, attackers delete the log files to hide traces. Which two actions should the security engineer take next? (Choose two.)

Options:

A.

Validate input upon submission.


B.

Block connections on port 443.


C.

Install antivirus.


D.

Update web application to the latest version.


E.

Enable file integrity monitoring.


Expert Solution
Questions # 38:

Refer to the exhibit.

Question # 38

What should an engineer determine from this Wireshark capture of suspicious network traffic?

Options:

A.

There are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections.


B.

There are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure.


C.

There are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure.


D.

There are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure.


Expert Solution
Questions # 39:

An incident responder reviews a log entry that shows a Microsoft Word process initiating an outbound network connection followed by PowerShell execution with obfuscated commands. Considering the machine's role in a sensitive data department, what is the most critical action for the responder to take next to analyze this output for potential indicators of compromise?

Options:

A.

Compare the metadata of the Microsoft Word document with known templates to verify its authenticity.


B.

Examine the network destination of the outbound connection to assess the credibility and categorize the traffic.


C.

Conduct a behavioral analysis of the PowerShell execution pattern and deobfuscate the commands to assess malicious intent.


D.

Correlate the time of the outbound network connection with the user's activity log to establish a usage pattern.


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions