Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-215 Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 2
Total 115 questions

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?

A.

spoofing

B.

obfuscation

C.

tunneling

D.

steganography

What describes the first step in performing a forensic analysis of infrastructure network devices?

A.

immediately disconnecting the device from the network

B.

initiating an immediate full system scan

C.

resetting the device to factory settings and analyzing the difference

D.

producing an accurate, forensic-grade duplicate of the device's data

An organization fell victim to a ransomware attack that successfully infected 256 hosts within its network. In the aftermath of this incident, the organization's cybersecurity team must prepare a thorough root cause analysis report. This report aims to identify the primary factor or factors that led to the successful ransomware attack and to develop strategies for preventing similar incidents in the future. In this context, what should the cybersecurity engineer include in the root cause analysis report to demonstrate the underlying cause of the incident?

A.

log files from each of the 256 infected hosts

B.

detailed information about the specific team members involved in the incident response effort

C.

method of infection employed by the ransomware

D.

complete threat intelligence report shared by the National CERT Association

Over the last year, an organization’s HR department has accessed data from its legal department on the last day of each month to create a monthly activity report. An engineer is analyzing suspicious activity alerted by a threat intelligence platform that an authorized user in the HR department has accessed legal data daily for the last week. The engineer pulled the network data from the legal department’s shared folders and discovered above average-size data dumps. Which threat actor is implied from these artifacts?

A.

privilege escalation

B.

internal user errors

C.

malicious insider

D.

external exfiltration

An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

A.

controlled folder access

B.

removable device restrictions

C.

signed macro requirements

D.

firewall rules creation

E.

network access control

Refer to the exhibit.

What does the exhibit indicate?

A.

The new file is created under the Software\Classes disk folder.

B.

A UAC bypass is created by modifying user-accessible registry settings.

C.

A scheduled task named "DelegateExecute" is created.

D.

The shell software is modified via PowerShell.

A workstation uploads encrypted traffic to a known clean domain over TCP port 80. What type of attack is occurring, according to the MITRE ATT&CK matrix?

A.

Exfiltration Over Web Service

B.

Exfiltration Over C2 Channel

C.

Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

D.

Command and Control Activity

A cybersecurity analyst is analyzing a complex set of threat intelligence data from internal and external sources. Among the data, they discover a series of indicators, including patterns of unusual network traffic, a sudden increase in failed login attempts, and multiple instances of suspicious file access on the company's internal servers. Additionally, an external threat feed highlights that threat actors are actively targeting organizations in the same industry using ransomware. Which action should the analyst recommend?

A.

Advise on monitoring the situation passively because network traffic anomalies are coincidental and unrelated to the ransomware threat.

B.

Propose isolation of affected systems and activating the incident response plan because the organization is likely under attack by the new ransomware strain.

C.

Advocate providing additional training on secure login practices because the increase in failed login attempts is likely a result of employee error.

D.

Notify of no requirement for immediate action because the suspicious file access incidents are normal operational activities and do not indicate an ongoing threat.

Refer to the exhibit.

The application x-dosexec with hash 691c65e4fb1d19f82465df1d34ad51aaeceba14a78167262dc7b2840a6a6aa87 is reported as malicious and labeled as "Trojan.Generic" by the threat intelligence tool. What is considered an indicator of compromise?

A.

modified registry

B.

hooking

C.

process injection

D.

data compression

A.

Evaluate the artifacts in Cisco Secure Malware Analytics.

B.

Evaluate the file activity in Cisco Umbrella.

C.

Analyze the registry activity section in Cisco Umbrella.

D.

Analyze the activity paths in Cisco Secure Malware Analytics.

A new zero-day vulnerability is discovered in the web application. Vulnerability does not require physical access and can be exploited remotely. Attackers are exploiting the new vulnerability by submitting a form with malicious content that grants them access to the server. After exploitation, attackers delete the log files to hide traces. Which two actions should the security engineer take next? (Choose two.)

A.

Validate input upon submission.

B.

Block connections on port 443.

C.

Install antivirus.

D.

Update web application to the latest version.

E.

Enable file integrity monitoring.

Refer to the exhibit.

A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event?

A.

DNS spoofing; encrypt communication protocols

B.

SYN flooding; block malicious packets

C.

ARP spoofing; configure port security

D.

MAC flooding; assign static entries

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

A.

Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

B.

Block all emails sent from an @state.gov address.

C.

Block all emails with pdf attachments.

D.

Block emails sent from Admin@state.net with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

E.

Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

An engineer is analyzing a DoS attack and notices that the perpetrator used a different IP address to hide their system IP address and avoid detection. Which anti-forensics technique did the perpetrator use?

A.

cache poisoning

B.

spoofing

C.

encapsulation

D.

onion routing

Page: 2 / 2
Total 115 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved