Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-215 Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-215 Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 115 questions

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

A.

verify the breadth of the attack

B.

collect logs

C.

request packet capture

D.

remove vulnerabilities

E.

scan hosts with updated signatures

A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?

A.

Cisco Secure Firewall ASA

B.

Cisco Secure Firewall Threat Defense (Firepower)

C.

Cisco Secure Email Gateway (ESA)

D.

Cisco Secure Web Appliance (WSA)

Which information is provided about the object file by the “-h” option in the objdump line commandobjdump –b oasys –m vax –h fu.o?

A.

bfdname

B.

debugging

C.

help

D.

headers

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

A.

An engineer should check the list of usernames currently logged in by running the command$ who | cut – d’ ‘ -f1| sort | uniq

B.

An engineer should check the server’s processes by running commandsps -auxandsudo ps -a

C.

An engineer should check the services on the machine by running the commandservice -status-all

D.

An engineer should check the last hundred entries of a web server with the commandsudo tail -100 /var/log/apache2/access.log

A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)

A.

anti-malware software

B.

data and workload isolation

C.

centralized user management

D.

intrusion prevention system

E.

enterprise block listing solution

What are two features of Cisco Secure Endpoint? (Choose two.)

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

A.

Initiate a connection to 23.1.4.14 over port 8443.

B.

Generate a Windows executable file.

C.

Open the Mozilla Firefox browser.

D.

Validate the SSL certificate for 23.1.4.14.

A.

VBScript

B.

Python

C.

Bash

D.

shell

Refer to the exhibit.

What is occurring?

A.

Obfuscated scripts are getting executed on the victim machine.

B.

Malware is modifying the registry keys.

C.

RDP is used to move laterally to systems within the victim environment.

D.

The threat actor creates persistence by creating a repeatable task.

A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?

A.

Reset the reporting user's account and enable multifactor authentication.

B.

Create a detailed incident report and share it with top management.

C.

Find any other emails coming from the IP address ranges that are managed by XYZCloud.

D.

Delete email from user mailboxes and update the incident ticket with lessons learned.

Refer to the exhibit.

Which element in this email is an indicator of attack?

A.

IP Address: 202.142.155.218

B.

content-Type: multipart/mixed

C.

attachment: “Card-Refund”

D.

subject: “Service Credit Card”

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

A.

Block any URLs in received emails.

B.

Blacklist IPs 164.90.168.78 and 199.19.224.83.

C.

Block any access to and from domain apponline-8473.xyz.

D.

Block any malicious activity with xfe-threat-score-10.

E.

Block all emails sent from malicious domain apponline-8473.xyz.

Refer to the exhibit. A network administrator creates an Apache log parser by using Python. What needs to be added in the box where the code is missing to accomplish the requirement?

A.

r'\d(1,3),\d(1.3),\d{13}.df{1,3}'

B.

r'*\b'

C.

r''\b{1-9}[0-9}\b'

D.

r'\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}'

Refer to the exhibit. A security analyst notices that a web application running on NGINX is generating an unusual number of log messages. The application is operational and reachable. What is the cause of this activity?

A.

botnet infection

B.

directory fuzzing

C.

DDoS attack

D.

SQL injection

Which tool should be used for dynamic malware analysis?

A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?

A.

phishing email sent to the victim

B.

alarm raised by the SIEM

C.

information from the email header

D.

alert identified by the cybersecurity team

Refer to the exhibit.

Which determination should be made by a security analyst?

A.

An email was sent with an attachment named “Grades.doc.exe”.

B.

An email was sent with an attachment named “Grades.doc”.

C.

An email was sent with an attachment named “Final Report.doc”.

D.

An email was sent with an attachment named “Final Report.doc.exe”.

Refer to the exhibit.

According to the SNORT alert, what is the attacker performing?

A.

brute-force attack against the web application user accounts

B.

XSS attack against the target webserver

C.

brute-force attack against directories and files on the target webserver

D.

SQL injection attack against the target webserver

Refer to the exhibit.

What should be determined from this Apache log?

A.

A module named mod_ssl is needed to make SSL connections.

B.

The private key does not match with the SSL certificate.

C.

The certificate file has been maliciously modified

D.

The SSL traffic setup is improper

Refer to the exhibit.

An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

A.

data obfuscation

B.

reconnaissance attack

C.

brute-force attack

D.

log tampering

Page: 1 / 2
Total 115 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved