Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 12 Topic 2 Discussion

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 12 Topic 2 Discussion

300-215 Exam Topic 2 Question 12 Discussion:
Question #: 12
Topic #: 2

An incident responder reviews a log entry that shows a Microsoft Word process initiating an outbound network connection followed by PowerShell execution with obfuscated commands. Considering the machine's role in a sensitive data department, what is the most critical action for the responder to take next to analyze this output for potential indicators of compromise?


A.

Compare the metadata of the Microsoft Word document with known templates to verify its authenticity.


B.

Examine the network destination of the outbound connection to assess the credibility and categorize the traffic.


C.

Conduct a behavioral analysis of the PowerShell execution pattern and deobfuscate the commands to assess malicious intent.


D.

Correlate the time of the outbound network connection with the user's activity log to establish a usage pattern.


Get Premium 300-215 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.