nerdexam
CiscoCisco

300-215 · Question #58

300-215 Question #58: Real Exam Question with Answer & Explanation

Sign in or unlock 300-215 to reveal the answer and full explanation for question #58. The question stem and answer options stay visible for context.

Submitted by daniela_cl· Mar 6, 2026Forensics Techniques

Question

Refer to the exhibit. What is occurring?

Options

  • AObfuscated scripts are getting executed on the victim machine.
  • BMalware is modifying the registry keys.
  • CRDP is used to move laterally to systems within the victim environment.
  • DThe threat actor creates persistence by creating a repeatable task.

Unlock 300-215 to see the answer

You've previewed enough free 300-215 questions. Unlock 300-215 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#persistence mechanism#scheduled tasks#threat actor techniques#Windows security
Full 300-215 PracticeBrowse All 300-215 Questions