Exam 7: Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

A

What is the function of a disassembler?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

A,C

  Refer to the exhibit. A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs? Refer to the exhibit. A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

(Multiple Choice)
4.8/5
(41)

An "unknown error code" is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?

(Multiple Choice)
4.8/5
(35)

Which information is provided bout the object file by the "-h" option in the objdump line command objdump -b oasys -m vax -h fu.o ?

(Multiple Choice)
4.8/5
(36)

  Refer to the exhibit. Which encoding technique is represented by this HEX string? Refer to the exhibit. Which encoding technique is represented by this HEX string?

(Multiple Choice)
4.8/5
(32)

A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file's behavior. Which logs should be reviewed next to evaluate this file further?

(Multiple Choice)
4.8/5
(30)

  Refer to the exhibit. What is the IOC threat and URL in this STIX JSON snippet? Refer to the exhibit. What is the IOC threat and URL in this STIX JSON snippet?

(Multiple Choice)
4.9/5
(38)

A security team receives reports of multiple files causing suspicious activity on users' workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)

(Multiple Choice)
4.7/5
(25)

Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?

(Multiple Choice)
4.8/5
(29)

  Refer to the exhibit. What should be determined from this Apache log? Refer to the exhibit. What should be determined from this Apache log?

(Multiple Choice)
4.8/5
(32)

  Refer to the exhibit. A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event? Refer to the exhibit. A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event?

(Multiple Choice)
4.9/5
(26)

A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)

(Multiple Choice)
4.8/5
(29)

  Refer to the exhibit. Which two actions should be taken based on the intelligence information? (Choose two.) Refer to the exhibit. Which two actions should be taken based on the intelligence information? (Choose two.)

(Multiple Choice)
4.7/5
(28)

  Refer to the exhibit. According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.) Refer to the exhibit. According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)

(Multiple Choice)
4.8/5
(43)

A security team received an alert of suspicious activity on a user's Internet browser. The user's anti-virus software indicated that the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should be taken by the security analyst with the executable file for further analysis? (Choose two.)

(Multiple Choice)
4.8/5
(29)

An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?

(Multiple Choice)
4.8/5
(25)

A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection of objects?

(Multiple Choice)
4.9/5
(37)

  Refer to the exhibit. An engineer is analyzing a TCP stream in a Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream? Refer to the exhibit. An engineer is analyzing a TCP stream in a Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream?

(Multiple Choice)
4.7/5
(31)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)