Question 6 of 56
Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console?
A.
Exam 300-215: Question 6 - Image 1
B.
Exam 300-215: Question 6 - Image 2
C.
Exam 300-215: Question 6 - Image 3
D.
Exam 300-215: Question 6 - Image 4
    Correct Answer:

Question 7 of 56
What is the transmogrify anti-forensics technique?
    Correct Answer: D

Question 8 of 56
What is the steganography anti-forensics technique?
    Correct Answer: A

Question 9 of 56
A security team receives reports of multiple files causing suspicious activity on users' workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)
    Correct Answer: B, C

Question 10 of 56
Exam 300-215: Question 10 - Image 1
Refer to the exhibit. An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?
    Correct Answer: D