Free 300-215 Exam Braindumps (page: 3)

Page 2 of 15

What is a concern for gathering forensics evidence in public cloud environments?

  1. High Cost: Cloud service providers typically charge high fees for allowing cloud forensics.
  2. Configuration: Implementing security zones and proper network segmentation.
  3. Timeliness: Gathering forensics evidence from cloud service providers typically requires substantial time.
  4. Multitenancy: Evidence gathering must avoid exposure of data from other tenants.

Answer(s): D


Reference:

https://www.researchgate.net/publication/307871954_About_Cloud_Forensics_Challenges_and_Solutions



Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console?





Answer(s): A



What is the transmogrify anti- forensics technique?

  1. hiding a section of a malicious file in unused areas of a file
  2. sending malicious files over a public network by encapsulation
  3. concealing malicious files in ordinary or unsuspecting places
  4. changing the file header of a malicious file to another file type

Answer(s): D


Reference:

https://www.csoonline.com/article/2122329/the-rise-of-anti-forensics.html#:~:text=Transmogrify%20is%20similarly%20wise%20to,a%20file%20from%2C%20say%2C%20.



What is the steganography anti- forensics technique?

  1. hiding a section of a malicious file in unused areas of a file
  2. changing the file header of a malicious file to another file type
  3. sending malicious files over a public network by encapsulation
  4. concealing malicious files in ordinary or unsuspecting places

Answer(s): A


Reference:

https://blog.eccouncil.org/6-anti-forensic-techniques-that-every-cyber-investigator-dreads/






Post your Comments and Discuss Cisco® 300-215 exam with other Community members:

300-215 Discussions & Posts