Free Cisco 300-215 Exam Actual Questions

The questions for 300-215 were last updated On Nov 7, 2024

Question No. 1

Refer to the exhibit.

Which type of code is being used?

Show Answer Hide Answer
Correct Answer: D

Question No. 2

Refer to the exhibit.

A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?

Show Answer Hide Answer
Question No. 3

Refer to the exhibit.

An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hour prior. Which two indicators of compromise should be determined from this information? (Choose two.)

Show Answer Hide Answer
Correct Answer: A, D

Question No. 4

A security team received reports of users receiving emails linked to external or unknown URLs that are non- returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

Show Answer Hide Answer
Correct Answer: D, E

Question No. 5

An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadership requested a report that identifies the problems that triggered the incident and the security team's approach to address these problems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?

Show Answer Hide Answer
Correct Answer: D