Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 300-215 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which tool should be used for dynamic malware analysis?

Options:
A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

Cisco 300-215 Premium Access
Questions 12

Refer to the exhibit.

300-215 Question 12

What does the exhibit indicate?

Options:
A.

The new file is created under the Software\Classes disk folder.

B.

A UAC bypass is created by modifying user-accessible registry settings.

C.

A scheduled task named "DelegateExecute" is created.

D.

The shell software is modified via PowerShell.

Questions 13

Refer to the exhibit.

300-215 Question 13

According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

Options:
A.

Domain name: iraniansk.com

B.

Server: nginx

C.

Hash value: 5f31ab113af08=1597090577

D.

filename= “Fy.exe”

E.

Content-Type: application/octet-stream

Questions 14

During an overnight shift, a cybersecurity team at a global trading firm detects irregular activity The network intrusion system flags an encrypted traffic spike from high-value transaction servers to an anonymous Tor exit node Simultaneously, internal surveillance tools report unusual database queries and access patterns resembling exfiltration techniques Which focused action should the team take first to analyze and address these potential security threats?

Options:
A.

Initiate immediate containment protocols tor transaction servers.

B.

Implement dynamic firewall rules to block suspicious outbound connections

C.

Cross-reference database access logs with user activity profiles

D.

Engage advanced decryption and anomaly analysis for the flagged traffic

Questions 15

A threat hunter must analyze the threat intelligence report on APT29 and identify whether the threat actor is on the Windows machines of the customer network. According to the report the user executes a malicious file on the victim machine that establishes a C? connection over port 53 Afterward, the attacker uses a CI.I to stage and exfiltrate business data. Which two types of logs enable the threat hunter to accomplish the task? (Choose two.)

Options:
A.

file integrity monitoring logs

B.

PowerShell togs

C.

web application firewall logs

D.

NetFlow logs

E.

DNS logs

Questions 16

Snort detects traffic that is targeting vulnerabilities in files that belong to software in the Microsoft Office suite. On a SIEM tool, the SOC analyst sees an alert from Cisco FMC. Cisco FMC is implemented with Snort IDs. Which alert message is shown?

Options:
A.

FILE-OFFICE Microsoft Graphics buffer overflow

B.

FILE-OFFICE Microsoft Graphics cross site scripting (XSS)

C.

FILE-OFFICE Microsoft Graphics SQL INJECTION

D.

FILE-OFFICE Microsoft Graphics remote code execution attempt

Questions 17

During a recent incident response investigation, several suspicious network connections originating from a specific host were identified. The host was quickly isolated and the machine was rebuilt During the post mortem, it became clear that there was unpreparedness regarding network artifacts necessitating adjustments to the playbooks to address this data from multiple sources must be correlated. Which two sources should be prioritized for data gathering? (Choose two.)

Options:
A.

Netflow data and host firewall logs

B.

user authentication logs and packet capture data

C.

antivirus alerts and system event togs

D.

application and system error logs

E.

DNS logs and web server togs

Questions 18

A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s behavior. Which logs should be reviewed next to evaluate this file further?

Options:
A.

email security appliance

B.

DNS server

C.

Antivirus solution

D.

network device

Questions 19

Refer to the exhibit.

300-215 Question 19

Which two actions should be taken as a result of this information? (Choose two.)

Options:
A.

Block any URLs in received emails.

B.

Blacklist IPs 164.90.168.78 and 199.19.224.83.

C.

Block any access to and from domain apponline-8473.xyz.

D.

Block any malicious activity with xfe-threat-score-10.

E.

Block all emails sent from malicious domain apponline-8473.xyz.

Questions 20

Refer to the exhibit.

300-215 Question 20

A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a possible indication of an attack because the SSHD system just went live and there should be nobody using it. Which action should the analyst take to respond to the alert?

Options:
A.

Investigate the alert by checking SSH logs and correlating with other relevant data in SIEM.

B.

Reset the admin password in SSHD to prevent unauthorized access to the system at scale.

C.

Ignore the alert and continue monitoring for further activity because the system was just implemented.

D.

Immediately block the IP address 192.168.1.100 from accessing the SSHD environment.

Exam Code: 300-215
Certification Provider: Cisco
Exam Name: Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
Last Update: Apr 7, 2026
Questions: 131