nerdexam
CiscoCisco

300-215 · Question #82

300-215 Question #82: Real Exam Question with Answer & Explanation

Sign in or unlock 300-215 to reveal the answer and full explanation for question #82. The question stem and answer options stay visible for context.

Submitted by tunde_lagos· Mar 6, 2026Forensics Techniques

Question

A cybersecurity analyst must evaluate files from endpoints and conduct ad-hoc scans in a highly secure government agency: During the analysis, the analyst identifies a set of suspicious files on multiple endpoints. These files exhibit unusual behavior, such as evading traditional antivirus scans and employing fileless malware techniques. In this technically challenging scenario, what should the cybersecurity analyst recommend as the next step in the process of evaluating these suspicious files and performing ad-hoc scans to ensure the highest level of security?

Options

  • AImmediately quarantine the endpoints containing the suspicious files and consider the issue
  • BIsolate the affected endpoints and conduct a detailed memory analysis to identify fileless malware
  • CDelete the suspicious files and monitor the endpoints for any further signs of compromise.
  • DShare the findings with other government agencies for collaborative threat analysis and response.

Unlock 300-215 to see the answer

You've previewed enough free 300-215 questions. Unlock 300-215 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#fileless malware#memory analysis#endpoint forensics#advanced threat detection
Full 300-215 PracticeBrowse All 300-215 Questions