Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-215 Questions and Answers

Question # 6

An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadership requested a report that identifies the problems that triggered the incident and the security team’s approach to address these problems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?

A.

impact and flow

B.

cause and effect

C.

risk and RPN

D.

motive and factors

Full Access
Question # 7

Refer to the exhibit.

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

A.

http.request.un matches

B.

tls.handshake.type ==1

C.

tcp.port eq 25

D.

tcp.window_size ==0

Full Access
Question # 8

Refer to the exhibit.

An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hour prior. Which two indicators of compromise should be determined from this information? (Choose two.)

A.

unauthorized system modification

B.

privilege escalation

C.

denial of service attack

D.

compromised root access

E.

malware outbreak

Full Access