Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Cisco CyberOps Professional 300-215 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 300-215 Premium Access

View all detail and faqs for the 300-215 exam


827 Students Passed

88% Average Score

94% Same Questions
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

A security team is notified from a Cisco ESA solution that an employee received an advertising email with an attached .pdf extension file. The employee opened the attachment, which appeared to be an empty document. The security analyst cannot identify clear signs of compromise but reviews running processes and determines that PowerShell.exe was spawned by CMD.exe with a grandparent AcroRd32.exe process. Which two actions should be taken to resolve this issue? (Choose two.)

Options:

A.

Upload the .pdf file to Cisco Threat Grid and analyze suspicious activity in depth.

B.

No action is required because this behavior is standard for .pdf files.

C.

Check the Windows Event Viewer for security logs about the incident.

D.

Quarantine this workstation for further investigation, as this event is an indication of suspicious activity.

E.

Investigate the reputation of the sender address and temporarily block all communications with this email domain.

Questions # 12:

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

Options:

A.

verify the breadth of the attack

B.

collect logs

C.

request packet capture

D.

remove vulnerabilities

E.

scan hosts with updated signatures

Questions # 13:

Data has been exfiltrated and advertised for sale on the dark web. A web server shows:

    Database unresponsiveness

    PageFile.sys changes

    Disk usage spikes with CPU spikes

    High page faults

Which action should the IR team perform on the server?

Options:

A.

Review the database.log file in the program files directory for database errors

B.

Examine the system.cfg file in the Windows directory for improper system configurations

C.

Analyze the PageFile.sys file in the System Drive and the Virtual Memory configuration

D.

Check the Memory.dmp file in the Windows directory for memory leak indications

Questions # 14:

Refer to the exhibit.

Question # 14

What is the indicator of compromise?

Options:

A.

SHA256 file hash

B.

indicator ID: malware--a932fcc6-e032-476c-826f-cb970a569bce

C.

indicator type: malicious-activity

D.

MD5 file hash

Questions # 15:

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

Options:

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Questions # 16:

What is a concern for gathering forensics evidence in public cloud environments?

Options:

A.

High Cost: Cloud service providers typically charge high fees for allowing cloud forensics.

B.

Configuration: Implementing security zones and proper network segmentation.

C.

Timeliness: Gathering forensics evidence from cloud service providers typically requires substantial time.

D.

Multitenancy: Evidence gathering must avoid exposure of data from other tenants.

Questions # 17:

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

Options:

A.

Upload the file signature to threat intelligence tools to determine if the file is malicious.

B.

Monitor processes as this is standard behavior of Word macro embedded documents.

C.

Contain the threat for further analysis as this is an indication of suspicious activity.

D.

Investigate the sender of the email and communicate with the employee to determine the motives.

Questions # 18:

An organization experienced a sophisticated phishing attack that resulted in the compromise of confidential information from thousands of user accounts. The threat actor used a land and expand approach, where initially accessed account was used to spread emails further. The organization's cybersecurity team must conduct an in-depth root cause analysis to uncover the central factor or factors responsible for the success of the phishing attack. The very first victim of the attack was user with email 500236186@test.com. The primary objective is to formulate effective strategies for preventing similar incidents in the future. What should the cybersecurity engineer prioritize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

investigation into the specific vulnerabilities or weaknesses in the organization's email security systems that were exploited by the attackers

B.

evaluation of the organization's incident response procedures and the performance of the incident response team

C.

examination of the organization's network traffic logs to identify patterns of unusual behavior leading up to the attack

D.

comprehensive analysis of the initial user for presence of an insider who gained monetary value by allowing the attack to happen

Questions # 19:

Refer to the exhibit.

Question # 19

Which two actions should be taken as a result of this information? (Choose two.)

Options:

A.

Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

B.

Block all emails sent from an @state.gov address.

C.

Block all emails with pdf attachments.

D.

Block emails sent from Admin@state.net with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

E.

Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

Questions # 20:

Refer to the exhibit.

Question # 20

A company that uses only the Unix platform implemented an intrusion detection system. After the initial configuration, the number of alerts is overwhelming, and an engineer needs to analyze and classify the alerts. The highest number of alerts were generated from the signature shown in the exhibit. Which classification should the engineer assign to this event?

Options:

A.

True Negative alert

B.

False Negative alert

C.

False Positive alert

D.

True Positive alert

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.