An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.) A. signatures B. host IP addresses C. file size D. dropped files E. domain names  Suggested Answer: BE This question is in 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Exam For getting Cisco Certified CyberOps Associate Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Cisco. Trademarks, certification & product names are used for reference only and belong to Cisco. The website does not contain actual questions and answers from Cisco's Certification Exam.
Please login or Register to submit your answer