Exam Name: | Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) | ||
Exam Code: | 300-215 Dumps | ||
Vendor: | Cisco | Certification: | CyberOps Professional |
Questions: | 115 Q&A's | Shared By: | hayley |
A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
What is a concern for gathering forensics evidence in public cloud environments?
An incident responder reviews a log entry that shows a Microsoft Word process initiating an outbound network connection followed by PowerShell execution with obfuscated commands. Considering the machine's role in a sensitive data department, what is the most critical action for the responder to take next to analyze this output for potential indicators of compromise?