Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Cisco CyberOps Professional 300-215 Questions and answers with Dumpstech

Exam 300-215 Premium Access

View all detail and faqs for the 300-215 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

A workstation uploads encrypted traffic to a known clean domain over TCP port 80. What type of attack is occurring, according to the MITRE ATT&CK matrix?

Options:

A.

Exfiltration Over Web Service

B.

Exfiltration Over C2 Channel

C.

Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

D.

Command and Control Activity

Questions # 22:

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

Options:

A.

An engineer should check the list of usernames currently logged in by running the command $ who | cut – d’ ‘ -f1| sort | uniq

B.

An engineer should check the server’s processes by running commands ps -aux and sudo ps -a

C.

An engineer should check the services on the machine by running the command service -status-all

D.

An engineer should check the last hundred entries of a web server with the command sudo tail -100 /var/log/apache2/access.log

Questions # 23:

What is an antiforensic technique to cover a digital footprint?

Options:

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Questions # 24:

An organization experienced a sophisticated phishing attack that resulted in the compromise of confidential information from thousands of user accounts. The threat actor used a land and expand approach, where initially accessed account was used to spread emails further. The organization's cybersecurity team must conduct an in-depth root cause analysis to uncover the central factor or factors responsible for the success of the phishing attack. The very first victim of the attack was user with email 500236186@test.com. The primary objective is to formulate effective strategies for preventing similar incidents in the future. What should the cybersecurity engineer prioritize in the root cause analysis report to demonstrate the underlying cause of the incident?

Options:

A.

investigation into the specific vulnerabilities or weaknesses in the organization's email security systems that were exploited by the attackers

B.

evaluation of the organization's incident response procedures and the performance of the incident response team

C.

examination of the organization's network traffic logs to identify patterns of unusual behavior leading up to the attack

D.

comprehensive analysis of the initial user for presence of an insider who gained monetary value by allowing the attack to happen

Questions # 25:

Refer to the exhibit.

Question # 25

What is occurring within the exhibit?

Options:

A.

Source 10.1.21.101 sends HTTP requests with the size of 302 kb.

B.

Host 209.141.51.196 redirects the client request from /Lk9tdZ to /files/1.bin.

C.

Host 209.141.51.196 redirects the client request to port 49723.

D.

Source 10.1.21.101 is communicating with 209.141.51.196 over an encrypted channel.

Questions # 26:

Refer to the exhibit.

Question # 26

Which two actions should be taken as a result of this information? (Choose two.)

Options:

A.

Block any URLs in received emails.

B.

Blacklist IPs 164.90.168.78 and 199.19.224.83.

C.

Block any access to and from domain apponline-8473.xyz.

D.

Block any malicious activity with xfe-threat-score-10.

E.

Block all emails sent from malicious domain apponline-8473.xyz.

Questions # 27:

Question # 27

Options:

A.

Initiate a connection to 23.1.4.14 over port 8443.

B.

Generate a Windows executable file.

C.

Open the Mozilla Firefox browser.

D.

Validate the SSL certificate for 23.1.4.14.

Questions # 28:

An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

Options:

A.

/var/log/syslog.log

B.

/var/log/vmksummary.log

C.

/var/log/shell.log

D.

/var/log/general/log

Questions # 29:

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

Options:

A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

Questions # 30:

A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?

Options:

A.

root cause

B.

intrusion prevention

C.

incident response

D.

attack surface

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions