Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 30 Topic 4 Discussion

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 30 Topic 4 Discussion

300-215 Exam Topic 4 Question 30 Discussion:
Question #: 30
Topic #: 4

A cybersecurity analyst is analyzing a complex set of threat intelligence data from internal and external sources. Among the data, they discover a series of indicators, including patterns of unusual network traffic, a sudden increase in failed login attempts, and multiple instances of suspicious file access on the company's internal servers. Additionally, an external threat feed highlights that threat actors are actively targeting organizations in the same industry using ransomware. Which action should the analyst recommend?


A.

Advise on monitoring the situation passively because network traffic anomalies are coincidental and unrelated to the ransomware threat.


B.

Propose isolation of affected systems and activating the incident response plan because the organization is likely under attack by the new ransomware strain.


C.

Advocate providing additional training on secure login practices because the increase in failed login attempts is likely a result of employee error.


D.

Notify of no requirement for immediate action because the suspicious file access incidents are normal operational activities and do not indicate an ongoing threat.


Get Premium 300-215 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.