لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is a use of TCPdump?
A. to analyze IP and other packets
B. to view encrypted data fields
C. to decode user credentials
D. to change IP ports
عرض الإجابة
اجابة صحيحة: B

View The Updated 300-215 Exam Questions

SPOTO Provides 100% Real 300-215 Exam Questions for You to Pass Your 300-215 Exam!

السؤال #2
A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
A. encryption
B. tunneling
C. obfuscation
D. poisoning
عرض الإجابة
اجابة صحيحة: CD
السؤال #3
Which two actions should be taken based on the intelligence information? (Choose two.)
A. Block network access to all
B. Add a SIEM rule to alert on connections to identified domains
C. Use the DNS server to block hole all
D. Block network access to identified domains
E. Route traffic from identified domains to block hole
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?
A. Cisco Secure Firewall ASA
B. Cisco Secure Firewall Threat Defense (Firepower)
C. Cisco Secure Email Gateway (ESA)
D. Cisco Secure Web Appliance (WSA)
عرض الإجابة
اجابة صحيحة: BC
السؤال #5
An engineer is analyzing a TCP stream in a Wireshark after a suspicious email with a URL. What should be determined about the SMB traffic from this stream?
A. It is redirecting to a malicious phishing website,
B. It is exploiting redirect vulnerability
C. It is requesting authentication on the user site
D. It is sharing access to files and printers
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which encoding technique is represented by this HEX string?
A. Unicode
B. Binary
C. Base64
D. Charcode
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?
A. http
B. tls
C. tcp
D. tcp
عرض الإجابة
اجابة صحيحة: B
السؤال #8
What is the IOC threat and URL in this STIX JSON snippet?
A. malware; ‘http://x4z9arb
B. malware; x4z9arb backdoor
C. x4z9arb backdoor; http://x4z9arb
D. malware; malware--162d917e-766f-4611-b5d6-652791454fca
E. stix; ‘http://x4z9arb
عرض الإجابة
اجابة صحيحة: BC
السؤال #9
Which two determinations should be made about the attack from the Apache access logs? (Choose two.)
A. The attacker used r57 exploit to elevate their privilege
B. The attacker uploaded the word press file manager trojan
C. The attacker performed a brute force attack against word press and used sql injection against the backend database
D. The attacker used the word press file manager plugin to upoad r57
E. The attacker logged on normally to word press admin page
عرض الإجابة
اجابة صحيحة: C
السؤال #10
What should an engineer determine from this Wireshark capture of suspicious network traffic?
A. There are signs of SYN flood attack, and the engineer should increase the backlog and recycle the oldest half-open TCP connections
B. There are signs of a malformed packet attack, and the engineer should limit the packet size and set a threshold of bytes as a countermeasure
C. There are signs of a DNS attack, and the engineer should hide the BIND version and restrict zone transfers as a countermeasure
D. There are signs of ARP spoofing, and the engineer should use Static ARP entries and IP address-to-MAC address mappings as a countermeasure
عرض الإجابة
اجابة صحيحة: A
السؤال #11
An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?
A. Delete the suspicious email with the attachment as the file is a shortcut extension and does not represent any threat
B. Upload the file to a virus checking engine to compare with well-known viruses as the file is a virus disguised as a legitimate extension
C. Quarantine the file within the endpoint antivirus solution as the file is a ransomware which will encrypt the documents of a victim
D. Open the file in a sandbox environment for further behavioral analysis as the file contains a malicious script that runs on execution
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which element in this email is an indicator of attack?
A. IP Address: 202
B. content-Type: multipart/mixed
C. attachment: “Card-Refund”
D. subject: “Service Credit Card”
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which information is provided bout the object file by the “-h” option in the objdump line command objdump –b oasys –m vax –h fu.o?
A. bfdname
B. debugging
C. help
D. headers
عرض الإجابة
اجابة صحيحة: BD
السؤال #14
A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)
A. Inspect registry entries
B. Inspect processes
C. Inspect file hash
D. Inspect file type
E. Inspect PE header
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A security team detected an above-average amount of inbound tcp/135 connection attempts from unidentified senders. The security team is responding based on their incident response playbook. Which two elements are part of the eradication phase for this incident? (Choose two.)
A. anti-malware software
B. data and workload isolation
C. centralized user management
D. intrusion prevention system
E. enterprise block listing solution
عرض الإجابة
اجابة صحيحة: A
السؤال #16
An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)
A. controlled folder access
B. removable device restrictions
C. signed macro requirements
D. firewall rules creation
E. network access control
عرض الإجابة
اجابة صحيحة: D
السؤال #17
An “unknown error code” is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?
A. /var/log/syslog
B. /var/log/vmksummary
C. var/log/shell
D. var/log/general/log
عرض الإجابة
اجابة صحيحة: D
السؤال #18
An employee receives an email from a “trusted” person containing a hyperlink that is malvertising. The employee clicks the link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included in this root cause analysis?
A. phishing email sent to the victim
B. alarm raised by the SIEM
C. information from the email header
D. alert identified by the cybersecurity team
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Over the last year, an organization’s HR department has accessed data from its legal department on the last day of each month to create a monthly activity report. An engineer is analyzing suspicious activity alerted by a threat intelligence platform that an authorized user in the HR department has accessed legal data daily for the last week. The engineer pulled the network data from the legal department’s shared folders and discovered above average-size data dumps. Which threat actor is implied from these a
A. privilege escalation
B. internal user errors
C. malicious insider
D. external exfiltration
عرض الإجابة
اجابة صحيحة: CD
السؤال #20
A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection
A. Get-Content-Folder \\Server\FTPFolder\Logfiles\ftpfiles
B. Get-Content –ifmatch \\Server\FTPFolder\Logfiles\ftpfiles
C. Get-Content –Directory \\Server\FTPFolder\Logfiles\ftpfiles
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which type of code is being used?
A. Shell
B. VBScript
C. BASH
D. Python
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: