nerdexam
CiscoCisco

300-215 · Question #109

300-215 Question #109: Real Exam Question with Answer & Explanation

The correct answer is D: Open the file in a sandbox environment for further behavioral analysis as the file contains a. The metadata in the exhibit reveals a strong indicator that this .LNK file (shortcut) is malicious: The shortcut file is named "ds7002.pdf" but actually points to the execution of PowerShell: Full path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Arguments include:

Submitted by zhang_li· Mar 6, 2026Forensics Techniques

Question

Refer to the exhibit. An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?

Options

  • ADelete the suspicious email with the attachment as the file is a shortcut extension and does not
  • BUpload the file to a virus checking engine to compare with well-known viruses as the file is a virus
  • CQuarantine the file within the endpoint antivirus solution as the file is a ransomware which will
  • DOpen the file in a sandbox environment for further behavioral analysis as the file contains a

Explanation

The metadata in the exhibit reveals a strong indicator that this .LNK file (shortcut) is malicious: The shortcut file is named "ds7002.pdf" but actually points to the execution of PowerShell: Full path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Arguments include: -noni -ep bypass $z = '...'; indicating an attempt to run a PowerShell script with execution policy bypassed (a known tactic for fileless malware delivery). The file is masked as a PDF (common social engineering technique), and PowerShell execution via .LNK is a signature technique used by many malware families to initiate second-stage payloads or scripts. Given this, the correct and safest course of action is to: Open the .LNK file in a sandbox environment (D). This enables safe behavioral analysis to observe what actions it attempts upon execution without endangering live systems.

Topics

#malware analysis#LNK files#sandbox analysis#email security

Community Discussion

No community discussion yet for this question.

Full 300-215 PracticeBrowse All 300-215 Questions