Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-215 Questions and Answers

Question # 6

Refer to the exhibit.

A cybersecurity analyst is presented with the snippet of code used by the threat actor and left behind during the latest incident and is asked to determine its type based on its structure and functionality. What is the type of code being examined?

A.

simple client-side script for downloading other elements

B.

basic web crawler for indexing website content

C.

network monitoring script for capturing incoming traffic

D.

socket programming listener for TCP/IP communication

Full Access
Question # 7

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

A.

Block any URLs in received emails.

B.

Blacklist IPs 164.90.168.78 and 199.19.224.83.

C.

Block any access to and from domain apponline-8473.xyz.

D.

Block any malicious activity with xfe-threat-score-10.

E.

Block all emails sent from malicious domain apponline-8473.xyz.

Full Access
Question # 8

Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?

A.

process injection

B.

privilege escalation

C.

GPO modification

D.

token manipulation

Full Access
Question # 9

A malware outbreak revealed that a firewall was misconfigured, allowing external access to the SharePoint server. What should the security team do next?

A.

Scan for and fix vulnerabilities on the firewall and server

B.

Harden the SharePoint server

C.

Disable external IP communications on all firewalls

D.

Review and update all firewall rules and the network security policy

Full Access
Question # 10

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

A.

Upload the file signature to threat intelligence tools to determine if the file is malicious.

B.

Monitor processes as this is standard behavior of Word macro embedded documents.

C.

Contain the threat for further analysis as this is an indication of suspicious activity.

D.

Investigate the sender of the email and communicate with the employee to determine the motives.

Full Access
Question # 11

A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?

A.

root cause

B.

intrusion prevention

C.

incident response

D.

attack surface

Full Access
Question # 12

Refer to the exhibit.

What is the IOC threat and URL in this STIX JSON snippet?

A.

malware; ‘http://x4z9arb.cn/4712/’

B.

malware; x4z9arb backdoor

C.

x4z9arb backdoor; http://x4z9arb.cn/4712/

D.

malware; malware--162d917e-766f-4611-b5d6-652791454fca

E.

stix; ‘http://x4z9arb.cn/4712/’

Full Access
Question # 13

Refer to the exhibit.

An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hours prior. Which two indicators of compromise should be determined from this information? (Choose two.)

A.

unauthorized system modification

B.

privilege escalation

C.

denial of service attack

D.

compromised root access

E.

malware outbreak

Full Access
Question # 14

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

A.

FILE-OFFICE Microsoft Graphics buffer overflow

B.

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.

FILE-OFFICE Microsoft Graphics remote code execution attempt

Full Access
Question # 15

What is an antiforensic technique to cover a digital footprint?

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Full Access
Question # 16

A security team needs to prevent a remote code execution vulnerability. The vulnerability can be exploited only by sending '${ string in the HTTP request. WAF rule is blocking '${', but system engineers detect that attackers are executing commands on the host anyway. Which action should the security team recommend?

A.

Enable URL decoding on WAF.

B.

Block incoming web traffic.

C.

Add two WAF rules to block 'S' and '{' characters separately.

D.

Deploy antimalware solution.

Full Access
Question # 17

Refer to the exhibit.

An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?

A.

Delete the suspicious email with the attachment as the file is a shortcut extension and does not represent any threat.

B.

Upload the file to a virus checking engine to compare with well-known viruses as the file is a virus disguised as a legitimate extension.

C.

Quarantine the file within the endpoint antivirus solution as the file is a ransomware which will encrypt the documents of a victim.

D.

Open the file in a sandbox environment for further behavioral analysis as the file contains a malicious script that runs on execution.

Full Access
Question # 18

Refer to the exhibit.

What is occurring?

A.

Obfuscated scripts are getting executed on the victim machine.

B.

Malware is modifying the registry keys.

C.

RDP is used to move laterally to systems within the victim environment.

D.

The threat actor creates persistence by creating a repeatable task.

Full Access
Question # 19

Which magic byte indicates that an analyzed file is a pdf file?

A.

cGRmZmlsZQ

B.

706466666

C.

255044462d

D.

0a0ah4cg

Full Access
Question # 20

Refer to the exhibit.

A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a possible indication of an attack because the SSHD system just went live and there should be nobody using it. Which action should the analyst take to respond to the alert?

A.

Investigate the alert by checking SSH logs and correlating with other relevant data in SIEM.

B.

Reset the admin password in SSHD to prevent unauthorized access to the system at scale.

C.

Ignore the alert and continue monitoring for further activity because the system was just implemented.

D.

Immediately block the IP address 192.168.1.100 from accessing the SSHD environment.

Full Access
Question # 21

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

A.

Inspect registry entries

B.

Inspect processes.

C.

Inspect file hash.

D.

Inspect file type.

E.

Inspect PE header.

Full Access
Question # 22

multiple machines behave abnormally. A sandbox analysis reveals malware. What must the administrator determine next?

A.

if Patient 0 still demonstrates suspicious behavior

B.

source code of the malicious attachment

C.

if the file in Patient 0 is encrypted

D.

if Patient 0 tried to connect to another workstation

Full Access
Question # 23

A security team is notified from a Cisco ESA solution that an employee received an advertising email with an attached .pdf extension file. The employee opened the attachment, which appeared to be an empty document. The security analyst cannot identify clear signs of compromise but reviews running processes and determines that PowerShell.exe was spawned by CMD.exe with a grandparent AcroRd32.exe process. Which two actions should be taken to resolve this issue? (Choose two.)

A.

Upload the .pdf file to Cisco Threat Grid and analyze suspicious activity in depth.

B.

No action is required because this behavior is standard for .pdf files.

C.

Check the Windows Event Viewer for security logs about the incident.

D.

Quarantine this workstation for further investigation, as this event is an indication of suspicious activity.

E.

Investigate the reputation of the sender address and temporarily block all communications with this email domain.

Full Access
Question # 24

Refer to the exhibit.

Which type of code is being used?

A.

Shell

B.

VBScript

C.

BASH

D.

Python

Full Access
Question # 25

An organization experienced a ransomware attack that resulted in the successful infection of their workstations within their network. As part of the incident response process, the organization's cybersecurity team must prepare a comprehensive root cause analysis report. This report aims to identify the primary factor or factors responsible for the successful ransomware attack and to formulate effective strategies to prevent similar incidents in the future. In this context, what should the cybersecurity engineer emphasize in the root cause analysis report to demonstrate the underlying cause of the incident?

A.

evaluation of user awareness and training programs aimed at preventing ransomware attacks

B.

analysis of the organization's network architecture and security infrastructure

C.

detailed examination of the ransomware variant, its encryption techniques, and command-and-control servers

D.

vulnerabilities present in the organization's software and systems that were exploited by the ransomware

Full Access
Question # 26

What is a concern for gathering forensics evidence in public cloud environments?

A.

High Cost: Cloud service providers typically charge high fees for allowing cloud forensics.

B.

Configuration: Implementing security zones and proper network segmentation.

C.

Timeliness: Gathering forensics evidence from cloud service providers typically requires substantial time.

D.

Multitenancy: Evidence gathering must avoid exposure of data from other tenants.

Full Access
Question # 27

A cybersecurity analyst is analyzing a complex set of threat intelligence data from internal and external sources. Among the data, they discover a series of indicators, including patterns of unusual network traffic, a sudden increase in failed login attempts, and multiple instances of suspicious file access on the company's internal servers. Additionally, an external threat feed highlights that threat actors are actively targeting organizations in the same industry using ransomware. Which action should the analyst recommend?

A.

Advise on monitoring the situation passively because network traffic anomalies are coincidental and unrelated to the ransomware threat.

B.

Propose isolation of affected systems and activating the incident response plan because the organization is likely under attack by the new ransomware strain.

C.

Advocate providing additional training on secure login practices because the increase in failed login attempts is likely a result of employee error.

D.

Notify of no requirement for immediate action because the suspicious file access incidents are normal operational activities and do not indicate an ongoing threat.

Full Access
Question # 28

A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?

A.

Cisco Secure Firewall ASA

B.

Cisco Secure Firewall Threat Defense (Firepower)

C.

Cisco Secure Email Gateway (ESA)

D.

Cisco Secure Web Appliance (WSA)

Full Access
Question # 29

Refer to the exhibit.

Which type of code created the snippet?

A.

VB Script

B.

Python

C.

PowerShell

D.

Bash Script

Full Access
Question # 30

A cybersecurity analyst detects fileless malware activity on secure endpoints. What should be done next?

A.

Immediately quarantine the endpoints containing the suspicious files and consider the issue resolved

B.

Isolate the affected endpoints and conduct a detailed memory analysis to identify fileless malware execution.

C.

Delete the suspicious files and monitor the endpoints for any further signs of compromise.

D.

Share the findings with other government agencies for collaborative threat analysis and response.

Full Access
Question # 31

Which issue is associated with gathering evidence from virtualized environments provided by major cloud vendors?

A.

increased data transparency provided by cloud vendors

B.

difficulty ensuring the integrity of data due to multitenancy

C.

reduced complexity in isolating and securing evidence

D.

simplified chain of custody due to virtualization

Full Access
Question # 32

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.

Which data is needed for further investigation?

A.

/var/log/access.log

B.

/var/log/messages.log

C.

/var/log/httpd/messages.log

D.

/var/log/httpd/access.log

Full Access
Question # 33

A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)

A.

Introduce a priority rating for incident response workloads.

B.

Provide phishing awareness training for the full security team.

C.

Conduct a risk audit of the incident response workflow.

D.

Create an executive team delegation plan.

E.

Automate security alert timeframes with escalation triggers.

Full Access
Question # 34

Which tool is used for reverse engineering malware?

A.

Ghidra

B.

SNORT

C.

Wireshark

D.

NMAP

Full Access
Question # 35

An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected application on their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic from this workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Which two actions should the engineer take? (Choose two.)

A.

Restore to a system recovery point.

B.

Replace the faulty CPU.

C.

Disconnect from the network.

D.

Format the workstation drives.

E.

Take an image of the workstation.

Full Access
Question # 36

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Full Access
Question # 37

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

Full Access
Question # 38

Which tool should be used for dynamic malware analysis?

A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

Full Access
Question # 39

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

A.

endpoint detection and response

B.

secure email gateway

C.

data loss prevention

D.

intrusion prevention system

E.

web application firewall

Full Access