Question 6 of 117

Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console?
A.
Exam 300-215: Question 6 - Image 1
B.
Exam 300-215: Question 6 - Image 2
C.
Exam 300-215: Question 6 - Image 3
D.
Exam 300-215: Question 6 - Image 4
Answer

Suggested Answer

Question 7 of 117

What is the transmogrify anti-forensics technique?
Answer

Suggested Answer

The suggested answer is D.

Reference:
https://www.csoonline.com/article/2122329/the-rise-of-anti-forensics.html#:~:text=Transmogrify%20is%20similarly%20wise%20to,a%20file%20from%2C%20say%
2C%20
.
Community Votes1 vote
DSuggested
100%
Question 8 of 117

What is the steganography anti-forensics technique?
Answer

Suggested Answer

The suggested answer is A.

https://blog.eccouncil.org/6-anti-forensic-techniques-that-every-cyber-investigator-dreads/
Community Votes1 vote
DMost voted
100%
Question 9 of 117

A security team receives reports of multiple files causing suspicious activity on users' workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, C.

Reference:
https://medium.com/@Flying_glasses/top-5-ways-to-detect-malicious-file-manually-d02744f7c43a
Question 10 of 117

Exam 300-215: Question 10 - Image 1
Refer to the exhibit. An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?
Answer

Suggested Answer

The suggested answer is D.

Community Votes2 votes
DSuggested
100%