Cisco 300-215 Exam
Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) (Page 4 )

Updated On: 18-Jan-2026

A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)

  1. Introduce a priority rating for incident response workloads.
  2. Provide phishing awareness training for the fill security team.
  3. Conduct a risk audit of the incident response workflow.
  4. Create an executive team delegation plan.
  5. Automate security alert timeframes with escalation triggers.

Answer(s): A,E



Which information is provided bout the object file by the “-h” option in the objdump line command objdump –b oasys –m vax –h fu.o?

  1. bfdname
  2. debugging
  3. help
  4. headers

Answer(s): D


Reference:

https://sourceware.org/binutils/docs/binutils/objdump.html



A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

  1. encryption
  2. tunneling
  3. obfuscation
  4. poisoning

Answer(s): C


Reference:

https://www.vadesecure.com/en/malware-analysis-understanding-code-obfuscation-techniques/#:~:text=Obfuscation%20of%20character%20strings%20is,data%20when%20the%20code%20executes.



Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?

  1. process injection
  2. privilege escalation
  3. GPO modification
  4. token manipulation

Answer(s): A


Reference:

https://attack.mitre.org/techniques/T1055/



Refer to the exhibit.


An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hour prior. Which two indicators of compromise should be determined from this information? (Choose two.)

  1. unauthorized system modification
  2. privilege escalation
  3. denial of service attack
  4. compromised root access
  5. malware outbreak

Answer(s): A,D



Viewing page 4 of 13
Viewing questions 16 - 20 out of 117 questions



Post your Comments and Discuss Cisco 300-215 exam prep with other Community members:

Join the 300-215 Discussion