Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 22 Topic 3 Discussion

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 22 Topic 3 Discussion

300-215 Exam Topic 3 Question 22 Discussion:
Question #: 22
Topic #: 3

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?


A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.


B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.


C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.


D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.


Get Premium 300-215 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.