Valid 300-215 Dumps shared by ExamDiscuss.com for Helping Passing 300-215 Exam! ExamDiscuss.com now offer the newest 300-215 exam dumps, the ExamDiscuss.com 300-215 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 300-215 dumps with Test Engine here:
A cybersecurity analyst is examining a complex dataset of threat intelligence information from various sources. Among the data, they notice multiple instances of domain name resolution requests to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system logs indicate a series of network anomalies, including unusual port scans and attempts to exploit known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic from a specific internal host to an external IP address located in a high-risk region. Which action should be prioritized by the organization?
Correct Answer: C
According to theCyberOps Technologies (CBRFIR) 300-215 study guidecurriculum, command-and-control (C2) communication is a strong indicator that a system has already been compromised and is actively under the control of an attacker. Sudden outbound traffic to high-risk regions and resolution of known malicious domains are high-confidence signs of an active threat. Therefore, prioritizing detection and disruption of this outbound traffic is critical to prevent further damage or data exfiltration. While monitoring vulnerability exploitation (B) and gathering port scan data (D) are also valuable, they are more preventive or forensic in nature. The most immediate threat-and therefore the top priority-is stopping active C2 communications.