Download Conducting Forensic Analysis & Incident Response Using Cisco Technologies for CyberOps.300-215.VCEplus.2020-12-17.58q.tqb

Vendor: Cisco
Exam Code: 300-215
Exam Name: Conducting Forensic Analysis & Incident Response Using Cisco Technologies for CyberOps
Date: Dec 17, 2020
File Size: 7 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload.
Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)
  1. Introduce a priority rating for incident response workloads.
  2. Provide phishing awareness training for the fill security team.
  3. Conduct a risk audit of the incident response workflow.
  4. Create an executive team delegation plan.
  5. Automate security alert timeframes with escalation triggers.
Correct answer: AE
Question 2
An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected application on their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic from this workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Which two actions should the engineer take? (Choose two.)
  1. Restore to a system recovery point.
  2. Replace the faulty CPU.
  3. Disconnect from the network.
  4. Format the workstation drives.
  5. Take an image of the workstation.
Correct answer: AE
Question 3
Refer to the exhibit. What should an engineer determine from this Wireshark capture of suspicious network traffic?
  1. There are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections.
  2. There are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure.
  3. There are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure.
  4. There are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!