Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 1 Topic 1 Discussion

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 1 Topic 1 Discussion

300-215 Exam Topic 1 Question 1 Discussion:
Question #: 1
Topic #: 1

Refer to the exhibit.

300-215 Question 1

A web hosting company analyst is analyzing the latest traffic because there was a 20% spike in server CPU usage recently. After correlating the logs, the problem seems to be related to the bad actor activities. Which attack vector is used and what mitigation can the analyst suggest?


A.

SQL Injection; implement input validation and use parameterized queries.


B.

Distributed denial of service; use rate limiting and DDoS protection services.


C.

Phishing attack; conduct regular user training and use email filtering solutions.


D.

Brute-force attack; implement account lockout policies and roll out MFA.


Get Premium 300-215 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.