Questions for the 300-215 were updated on : Dec 01 ,2025
Refer to the exhibit.
A web hosting company analyst is analyzing the latest traffic because there was a 20% spike in server
CPU usage recently. After correlating the logs, the problem seems to be related to the bad actor
activities. Which attack vector is used and what mitigation can the analyst suggest?
D
Explanation:
Comprehensive and Detailed
The log entries show repeated SSH login attempts for various invalid usernames (e.g., admin,
phoenix, rainbow, test, user, etc.) from different source ports. These are clear signs of a brute-force
attack—an automated process trying multiple usernames and passwords in hopes of gaining access.
Mitigating such attacks includes:
Implementing account lockout policies (e.g., locking an account after several failed login attempts).
Enabling Multi-Factor Authentication (MFA) to ensure that password guessing alone is insufficient for
account access.
Therefore, the correct answer is:
D . Brute-force attack; implement account lockout policies and roll out MFA.
Refer to the exhibit.
multiple machines behave abnormally. A sandbox analysis reveals malware. What must the
administrator determine next?
D
Explanation:
The key goal during lateral movement analysis is to determine whether the malware spread or
attempted to spread beyond the initially compromised system. This is crucial for containment and
scoping of the incident. Logs, sandbox behavior, or network activity may show if Patient 0 initiated
outbound connections to other systems, potentially propagating malware across the environment.
Correct answer: D. if Patient 0 tried to connect to another workstation.
Refer to the exhibit.
D
Explanation:
The string shown is long, alphanumeric, and includes both uppercase and lowercase letters with
numbers—characteristics of Base64 encoding. This format is widely used to obfuscate payloads in
malicious scripts, particularly in phishing or malware campaigns. Base64 encoding is also supported
by Python and other platforms for data transformation.
—
Refer to the exhibit.
B
Explanation:
The code includes syntax and modules such as import win32con, import win32api, and uses Python-
specific formatting like def, try/except, and print, clearly indicating that this is written in Python. It
also uses the wmi module to monitor process creation events—a common technique in Python-
based process monitoring scripts on Windows.
—
A cybersecurity analyst must identify an unknown service causing high CPU on a Windows server.
What tool should be used?
B
Explanation:
Process Explorer is an advanced Windows-based utility that shows real-time data about running
processes, CPU usage, services, DLLs, and handles. It is specifically designed for this kind of
investigation and is part of the Sysinternals Suite.
Which issue is related to gathering evidence from cloud vendors?
B
Explanation:
In cloud environments, investigators typically do not have access to the physical storage devices
where the data resides. This restricts traditional forensic processes, such as imaging or direct disk
access, which are commonly used in on-premises investigations.
A cybersecurity analyst detects fileless malware activity on secure endpoints. What should be done
next?
B
Explanation:
Fileless malware resides in memory and does not leave traditional file artifacts, making it difficult for
antivirus solutions to detect. The most effective next step is to isolate the endpoints to prevent
lateral movement and perform memory forensics to capture volatile data and identify any running
malicious processes.
An incident response analyst is preparing to scan memory using a YARA rule. How is this task
completed?
C
Explanation:
YARA rules are pattern-matching rules used to identify malware based on specific strings, conditions,
and binary patterns. They are most effective in memory or file scans where analysts search for known
indicators or unique signatures via string matching.
Correct answer: C. string matching.
A malware outbreak revealed that a firewall was misconfigured, allowing external access to the
SharePoint server. What should the security team do next?
D
Explanation:
The incident stems from a policy-level issue rather than a technical vulnerability. According to
incident response best practices, the priority should be to review and update firewall rules and
ensure that the network security policy aligns with the principle of least privilege and correct access
segmentation.
Data has been exfiltrated and advertised for sale on the dark web. A web server shows:
Database unresponsiveness
PageFile.sys changes
Disk usage spikes with CPU spikes
High page faults
Which action should the IR team perform on the server?
C
Explanation:
The combination of CPU spikes, disk usage peaks, and fluctuating PageFile.sys indicates excessive
virtual memory paging, which may be a sign of malicious memory or file access behavior.
PageFile.sys is part of the virtual memory system, and analyzing it can reveal which processes or
payloads are consuming unusual amounts of memory, especially during exfiltration events.

A
Explanation:
Comprehensive and Detailed
From the exhibit, Cisco Secure Malware Analytics (formerly Threat Grid) has captured outbound
HTTP POST communication to the IP address 51.38.124.206 on port 80. This destination is
highlighted in the analysis under “Outbound HTTP POST Communications,” indicating exfiltration
behavior or command-and-control (C2) signaling.
Key indicators:
The report shows that binary data was POSTed to this IP.
The source system generated 22 packets and sent 6,192 bytes.
The system has flagged the behavior with a severity of 25 and confidence of 25—suggesting that this
is an IoC worth acting on.
Therefore, the artifacts suggest that the destination IP 51.38.124.206 is involved in malicious activity,
and the correct answer is:
Answer: A. Destination IP 51.38.124.206 is identified as malicious.
Explanation:
A company had a recent data leak incident. A security engineer investigating the incident discovered
that a malicious link was accessed by multiple employees. Further investigation revealed targeted
phishing attack attempts on macOS systems, which led to backdoor installations and data
compromise. Which two security solutions should a security engineer recommend to mitigate similar
attacks in the future? (Choose two.)
A, B
Explanation:
Comprehensive and Detailed
Endpoint Detection and Response (EDR) tools provide behavioral analytics and continuous
monitoring to detect malware such as backdoors, which is especially critical on endpoints like macOS
devices. These tools are essential to detect post-compromise activities and contain threats before
they spread.
Secure Email Gateway (e.g., Cisco ESA) plays a key role in blocking phishing emails—the initial vector
in this attack. It uses filters and reputation analysis to prevent malicious links or attachments from
reaching end users.
Incorrect Options:
C. DLP focuses on preventing data exfiltration, not phishing prevention or backdoor detection.
D. IPS is effective for known signature-based threats but less effective against phishing links and
endpoint-level backdoors.
E. WAF protects web servers, not end-user devices from phishing or backdoor infections.
Therefore, the correct answers are: A and B.
An analyst finds .xyz files of unknown origin that are large and undetected by antivirus. What action
should be taken next?
A
Explanation:
The safest and most effective approach is to isolate the files and subject them to heuristic and
behavioral analysis. This can reveal obfuscated malware or unauthorized data storage techniques,
even if signature-based antivirus fails to flag them.
A workstation uploads encrypted traffic to a known clean domain over TCP port 80. What type of
attack is occurring, according to the MITRE ATT&CK matrix?
C
Explanation:
According to the MITRE ATT&CK matrix, when encrypted traffic is tunneled through a legitimate
protocol such as HTTP (port 80) to a non-malicious domain, this aligns with the tactic “Exfiltration
Over Asymmetric Encrypted Non-C2 Protocol” (T1048.002). The attacker is trying to hide exfiltration
in otherwise benign traffic.
What are two features of Cisco Secure Endpoint? (Choose two.)
A, C
Explanation:
Cisco Secure Endpoint (formerly AMP for Endpoints) offers features like:
File trajectory: to track file behavior and spread across endpoints.
Orbital Advanced Search: for querying endpoint data to detect threats in real time.