Cisco
300-215
116
Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR)
A: process injection
B: privilege escalation
C: GPO modification
D: token manipulation
A: impact and flow
B: cause and effect
C: risk and RPN
D: motive and factors
A: /var/log/syslog.log
B: /var/log/vmksummary.log
C: var/log/shell.log
D: var/log/general/log
A: Cisco Secure Firewall ASA
B: Cisco Secure Firewall Threat Defense (Firepower)
C: Cisco Secure Email Gateway (ESA)
D: Cisco Secure Web Appliance (WSA)