Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Question and Answers

Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

Last Update Feb 28, 2026
Total Questions : 131

We are offering FREE 300-215 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-215 free exam questions and then go for complete pool of Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) test questions that will help you more.

300-215 pdf

300-215 PDF

$40.25  $114.99
300-215 Engine

300-215 Testing Engine

$47.25  $134.99
300-215 PDF + Engine

300-215 PDF + Testing Engine

$61.25  $174.99
Questions 1

Which type of record enables forensics analysts to identify fileless malware on Windows machines?

Options:

A.  

IIS logs

B.  

file event records

C.  

PowerShell event logs

D.  

network records

Discussion 0
Questions 2

An investigator notices that GRE packets are going undetected over the public network. What is occurring?

Options:

A.  

encryption

B.  

tunneling

C.  

decryption

D.  

steganography

Discussion 0
Questions 3

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.  

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.  

analysis of the organization's network architecture and security infrastructure

C.  

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.  

vulnerabilities present in the organization's software and systems that were exploited by the ransomware

Discussion 0
Questions 4

Drag and drop the capabilities on the left onto the Cisco security solutions on the right.

Options:

Discussion 0
Questions 5

Refer to the exhibit.

Which two actions should be taken based on the intelligence information? (Choose two.)

Options:

A.  

Block network access to all .shop domains

B.  

Add a SIEM rule to alert on connections to identified domains.

C.  

Use the DNS server to block hole all .shop requests.

D.  

Block network access to identified domains.

E.  

Route traffic from identified domains to block hole.

Discussion 0
Questions 6

Refer to the exhibit.

What do these artifacts indicate?

Options:

A.  

An executable file is requesting an application download.

B.  

A malicious file is redirecting users to different domains.

C.  

The MD5 of a file is identified as a virus and is being blocked.

D.  

A forged DNS request is forwarding users to malicious websites.

Discussion 0
Questions 7

What can the blue team achieve by using Hex Fiend against a piece of malware?

Options:

A.  

Use the hex data to define patterns in VARA rules.

B.  

Read the hex data and transmognify into a readable ELF format

C.  

Use the hex data to modify BE header to read the file.

D.  

Read the hex data and decrypt payload via access key.

Discussion 0
Questions 8

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

Options:

A.  

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.  

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.  

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.  

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

Discussion 0
Questions 9

Refer to the exhibit.

Which encoding method is used to obfuscate the script?

Options:

A.  

ASCII85 encoding

B.  

Base64 encoding

C.  

metamorphic encoding

D.  

hex encoding

Discussion 0
Questions 10

A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection of objects?

Options:

A.  

Get-Content-Folder \Server\FTPFolder\Logfiles\ftpfiles.log | Show-From “ERROR”, “SUCCESS”

B.  

Get-Content –ifmatch \Server\FTPFolder\Logfiles\ftpfiles.log | Copy-Marked “ERROR”, “SUCCESS”

C.  

Get-Content –Directory \Server\FTPFolder\Logfiles\ftpfiles.log | Export-Result “ERROR”, “SUCCESS”

D.  

Get-Content –Path \Server\FTPFolder\Logfiles\ftpfiles.log | Select-String “ERROR”, “SUCCESS”

Discussion 0
Questions 11

Which issue is associated with gathering evidence from virtualized environments provided by major cloud vendors?

Options:

A.  

increased data transparency provided by cloud vendors

B.  

difficulty ensuring the integrity of data due to multitenancy

C.  

reduced complexity in isolating and securing evidence

D.  

simplified chain of custody due to virtualization

Discussion 0
Questions 12

An organization fell victim to a ransomware attack that successfully infected 256 hosts within its network. In the aftermath of this incident, the organization's cybersecurity team must prepare a thorough root cause analysis report. This report aims to identify the primary factor or factors that led to the successful ransomware attack and to develop strategies for preventing similar incidents in the future. In this context, what should the cybersecurity engineer include in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.  

log files from each of the 256 infected hosts

B.  

detailed information about the specific team members involved in the incident response effort

C.  

method of infection employed by the ransomware

D.  

complete threat intelligence report shared by the National CERT Association

Discussion 0
Questions 13

What is the function of a disassembler?

Options:

A.  

aids performing static malware analysis

B.  

aids viewing and changing the running state

C.  

aids transforming symbolic language into machine code

D.  

aids defining breakpoints in program execution

Discussion 0
Questions 14

During an overnight shift, a cybersecurity team at a global trading firm detects irregular activity The network intrusion system flags an encrypted traffic spike from high-value transaction servers to an anonymous Tor exit node Simultaneously, internal surveillance tools report unusual database queries and access patterns resembling exfiltration techniques Which focused action should the team take first to analyze and address these potential security threats?

Options:

A.  

Initiate immediate containment protocols tor transaction servers.

B.  

Implement dynamic firewall rules to block suspicious outbound connections

C.  

Cross-reference database access logs with user activity profiles

D.  

Engage advanced decryption and anomaly analysis for the flagged traffic

Discussion 0
Questions 15

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

Options:

A.  

endpoint detection and response

B.  

secure email gateway

C.  

data loss prevention

D.  

intrusion prevention system

E.  

web application firewall

Discussion 0
Questions 16

Refer to the exhibit.

What is the indicator of compromise?

Options:

A.  

SHA256 file hash

B.  

indicator ID: malware--a932fcc6-e032-476c-826f-cb970a569bce

C.  

indicator type: malicious-activity

D.  

MD5 file hash

Discussion 0
Questions 17

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

Options:

A.  

deobfuscation

B.  

XML injection

C.  

string matching

D.  

data diddling

Discussion 0
Questions 18

An insider scattered multiple USB flash drives with zero-day malware in a company HQ building. Many employees connected the USB flash drives to their workstations. An attacker was able to get access to endpoints from outside, steal user credentials, and exfiltrate confidential information from internal web resources. Which two steps prevent these types of security incidents in the future? (Choose two.)

Options:

A.  

Automate security alerts on connected USB flash drives to workstations.

B.  

Provide security awareness training and block usage of external drives.

C.  

Deploy antivirus software on employee workstations to detect malicious software.

D.  

Encrypt traffic from employee workstations to internal web services.

E.  

Deploy MFA authentication to prevent unauthorized access to critical assets.

Discussion 0
Questions 19

Refer to the exhibit.

A web hosting company analyst is analyzing the latest traffic because there was a 20% spike in server CPU usage recently. After correlating the logs, the problem seems to be related to the bad actor activities. Which attack vector is used and what mitigation can the analyst suggest?

Options:

A.  

SQL Injection; implement input validation and use parameterized queries.

B.  

Distributed denial of service; use rate limiting and DDoS protection services.

C.  

Phishing attack; conduct regular user training and use email filtering solutions.

D.  

Brute-force attack; implement account lockout policies and roll out MFA.

Discussion 0
Questions 20

Options:

A.  

JavaScript

B.  

Base64

C.  

ascii85

D.  

hexadecimal

Discussion 0
Questions 21

An incident response team is recommending changes after analyzing a recent compromise in which:

    a large number of events and logs were involved;

    team members were not able to identify the anomalous behavior and escalate it in a timely manner;

    several network systems were affected as a result of the latency in detection;

    security engineers were able to mitigate the threat and bring systems back to a stable state; and

    the issue reoccurred shortly after and systems became unstable again because the correct information was not gathered during the initial identification phase.

Which two recommendations should be made for improving the incident response process? (Choose two.)

Options:

A.  

Formalize reporting requirements and responsibilities to update management and internal stakeholders throughout the incident-handling process effectively.

B.  

Improve the mitigation phase to ensure causes can be quickly identified, and systems returned to a functioning state.

C.  

Implement an automated operation to pull systems events/logs and bring them into an organizational context.

D.  

Allocate additional resources for the containment phase to stabilize systems in a timely manner and reduce an attack’s breadth.

E.  

Modify the incident handling playbook and checklist to ensure alignment and agreement on roles, responsibilities, and steps before an incident occurs.

Discussion 0
Questions 22

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

Options:

A.  

FILE-OFFICE Microsoft Graphics buffer overflow

B.  

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.  

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.  

FILE-OFFICE Microsoft Graphics remote code execution attempt

Discussion 0
Questions 23

A financial company handling international transactions recently experienced a complex security incident The incident involves simultaneous DDoS attacks, suspected internal data leakage and the discovery of sophisticated malware implants that have remained dormant until triggered remotely During the incident it became clear that the current procedures are inadequate and plans to tackle issues were created on the go To counter this problem going forward, the IR team is developing an incident playbook to be used if a similar incident reoccurs Which set of elements of the playbook must be introduced?

Options:

A.  

Introducing DDoS mitigation procedures, internal data leak investigations, and proactive malware containment

B.  

Establishing real-time collaboration procedures, increasing data encryption and revising access controls

C.  

Engaging third-party cybersecurity experts expanding throat intelligence sharing and improving incident documentation

D.  

Enhancing monitoring protocols, updating firewall rules, and automating traffic analysis tasks efficiently

Discussion 0
Questions 24

Refer to the exhibit.

An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

Options:

A.  

data obfuscation

B.  

reconnaissance attack

C.  

brute-force attack

D.  

log tampering

Discussion 0
Questions 25

What is an antiforensic technique to cover a digital footprint?

Options:

A.  

authorization

B.  

obfuscation

C.  

privilege escalation

D.  

authentication

Discussion 0
Questions 26

Which tool should be used for dynamic malware analysis?

Options:

A.  

Decompiler

B.  

Unpacker

C.  

Disassembler

D.  

Sandbox

Discussion 0
Questions 27

What is the goal of an incident response plan?

Options:

A.  

to identify critical systems and resources in an organization

B.  

to ensure systems are in place to prevent an attack

C.  

to determine security weaknesses and recommend solutions

D.  

to contain an attack and prevent it from spreading

Discussion 0
Questions 28

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

Options:

A.  

anti-malware software

B.  

data and workload isolation

C.  

centralized user management

D.  

intrusion prevention system

E.  

enterprise block listing solution

Discussion 0
Questions 29

Refer to the exhibit.

Options:

A.  

hex encoding

B.  

metamorphic encoding

C.  

ASCII85 encoding

D.  

Base64 encoding

Discussion 0
Questions 30

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

Options:

A.  

Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

B.  

Block all emails sent from an @state.gov address.

C.  

Block all emails with pdf attachments.

D.  

Block emails sent from Admin@state.net with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

E.  

Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

Discussion 0
Questions 31

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

Options:

A.  

Upload the file signature to threat intelligence tools to determine if the file is malicious.

B.  

Monitor processes as this is standard behavior of Word macro embedded documents.

C.  

Contain the threat for further analysis as this is an indication of suspicious activity.

D.  

Investigate the sender of the email and communicate with the employee to determine the motives.

Discussion 0
Questions 32

An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected application on their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic from this workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Which two actions should the engineer take? (Choose two.)

Options:

A.  

Restore to a system recovery point.

B.  

Replace the faulty CPU.

C.  

Disconnect from the network.

D.  

Format the workstation drives.

E.  

Take an image of the workstation.

Discussion 0
Questions 33

What is a use of TCPdump?

Options:

A.  

to analyze IP and other packets

B.  

to view encrypted data fields

C.  

to decode user credentials

D.  

to change IP ports

Discussion 0
Questions 34

In a secure government communication network, an automated alert indicates the presence of anomalous DLL files injected into the system memory during a routine update of communication protocols. These DLL files are exhibiting beaconing behavior to a satellite IP known for signal interception risks. Concurrently, there is an uptick in encrypted traffic volumes that suggests possible data exfiltration. Which set of actions should the security engineer prioritize?

Options:

A.  

Invoke a classified incident response scenario, notify national defense cyber operatives, and begin containment and eradication procedures on affected systems.

B.  

Conduct memory forensics to analyze the suspicious DLL files, disrupt the beaconing sequence, and assess the encrypted traffic for breach indicators.

C.  

Activate a secure emergency communication channel, isolate the segments of the communication network, and initiate a threat hunting operation for further anomalies.

D.  

Sever connections to the satellite IP, execute a rollback of the recent protocol updates, and engage counter-intelligence cybersecurity measures.

Discussion 0
Questions 35

What is the purpose of YARA rules in malware analysis and now do the rules atd in identifying, classifying, and documenting malware?

Options:

A.  

They automatically remove malware from an infected system while documenting the behavior of the APT

B.  

They encrypt identified malware on a system to prevent execution of files with the same classification

C.  

They create a backup of identified malware and classify it according to its origin and source

D.  

They use specific static patterns and attributes to identify and classify matware, characterizing its nature

Discussion 0
Questions 36

Refer to the exhibit.

A company that uses only the Unix platform implemented an intrusion detection system. After the initial configuration, the number of alerts is overwhelming, and an engineer needs to analyze and classify the alerts. The highest number of alerts were generated from the signature shown in the exhibit. Which classification should the engineer assign to this event?

Options:

A.  

True Negative alert

B.  

False Negative alert

C.  

False Positive alert

D.  

True Positive alert

Discussion 0
Questions 37

What is the steganography anti-forensics technique?

Options:

A.  

hiding a section of a malicious file in unused areas of a file

B.  

changing the file header of a malicious file to another file type

C.  

sending malicious files over a public network by encapsulation

D.  

concealing malicious files in ordinary or unsuspecting places

Discussion 0
Questions 38

What are YARA rules based upon?

Options:

A.  

binary patterns

B.  

HTML code

C.  

network artifacts

D.  

IP addresses

Discussion 0
Questions 39

A security team received an alert of suspicious activity on a user’s Internet browser. The user’s anti-virus software indicated that the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should be taken by the security analyst with the executable file for further analysis? (Choose two.)

Options:

A.  

Evaluate the process activity in Cisco Umbrella.

B.  

Analyze the TCP/IP Streams in Cisco Secure Malware Analytics (Threat Grid).

C.  

Evaluate the behavioral indicators in Cisco Secure Malware Analytics (Threat Grid).

D.  

Analyze the Magic File type in Cisco Umbrella.

E.  

Network Exit Localization in Cisco Secure Malware Analytics (Threat Grid).

Discussion 0