Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 300-215 Practice Exam with Questions & Answers

Questions 1

Which two tools conduct network traffic analysis in the absence of a graphical user interface? (Choose two.)

Options:
A.

Network Extractor

B.

TCPdump

C.

TCPshark

D.

Wireshark

E.

NetworkDebuggerPro

Cisco 300-215 Premium Access
Questions 2

Drag and drop the steps from the left into the order to perform forensics analysis of infrastructure networks on the right.

300-215 Question 2

Options:
Questions 3

Which information is provided about the object file by the “-h” option in the objdump line commandobjdump –b oasys –m vax –h fu.o?

Options:
A.

bfdname

B.

debugging

C.

help

D.

headers

Questions 4

A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?

Options:
A.

Threat intelligence information should be marked as false positive because unnecessary alerts impact security key performance indicators.

B.

Focus should be applied toward attempts of known vulnerability exploitation because the attacker might land and expand quickly.

C.

Organization should focus on C2 communication attempts and the sudden increase in outbound network traffic via a specific host.

D.

Data on ports being scanned should be collected and SSL decryption on Firewall enabled to capture the potentially malicious traffic.

Questions 5

Which issue is related to gathering evidence from cloud vendors?

Options:
A.

Deleted data cannot be recovered in cloud services.

B.

There is limited access to physical media.

C.

Forensics tools do not apply on cloud services.

D.

The chain of custody does not apply on cloud services.

Questions 6

An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Options:
A.

controlled folder access

B.

removable device restrictions

C.

signed macro requirements

D.

firewall rules creation

E.

network access control

Questions 7

Which tool conducts memory analysis?

Options:
A.

MemDump

B.

Sysinternals Autoruns

C.

Volatility

D.

Memoryze

Questions 8

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

Options:
A.

Inspect registry entries

B.

Inspect processes.

C.

Inspect file hash.

D.

Inspect file type.

E.

Inspect PE header.

Questions 9

Refer to the exhibit.

300-215 Question 9

Which two determinations should be made about the attack from the Apache access logs? (Choose two.)

Options:
A.

The attacker used r57 exploit to elevate their privilege.

B.

The attacker uploaded the WordPress file manager trojan.

C.

The attacker performed a brute force attack against WordPress and used SQL injection against the backend database.

D.

The attacker used the WordPress file manager plugin to upload r57.php.

E.

The attacker logged on normally to WordPress admin page.

Questions 10

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

Options:
A.

verify the breadth of the attack

B.

collect logs

C.

request packet capture

D.

remove vulnerabilities

E.

scan hosts with updated signatures

Exam Code: 300-215
Certification Provider: Cisco
Exam Name: Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
Last Update: Jul 10, 2025
Questions: 115