Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Exam Practice Test

Page: 1 / 14
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices. Which technical architecture must be used?

Options:

A.

DLP for data in motion

B.

DLP for removable data

C.

DLP for data in use

D.

DLP for data at rest

Question 2

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

Options:

A.

Allow list only authorized hosts to contact the application’s IP at a specific port.

B.

Allow list HTTP traffic through the corporate VLANS.

C.

Allow list traffic to application’s IP from the internal network at a specific port.

D.

Allow list only authorized hosts to contact the application’s VLAN.

Question 3

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?

Options:

A.

use of the Nmap tool to identify the vulnerability when the new code was deployed

B.

implementation of a firewall and intrusion detection system

C.

implementation of an endpoint protection system

D.

use of SecDevOps to detect the vulnerability during development

Question 4

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

Options:

A.

incident response playbooks

B.

asset vulnerability assessment

C.

report of staff members with asset relations

D.

key assets and executives

E.

malware analysis report

Question 5

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

Options:

A.

Analyze environmental threats and causes

B.

Inform the product security incident response team to investigate further

C.

Analyze the precursors and indicators

D.

Inform the computer security incident response team to investigate further

Question 6

A threat actor attacked an organization’s Active Directory server from a remote location, and in a thirty-minute timeframe, stole the password for the administrator account and attempted to access 3 company servers. The threat actor successfully accessed the first server that contained sales data, but no files were downloaded. A second server was also accessed that contained marketing information and 11 files were downloaded. When the threat actor accessed the third server that contained corporate financial data, the session was disconnected, and the administrator’s account was disabled. Which activity triggered the behavior analytics tool?

Options:

A.

accessing the Active Directory server

B.

accessing the server with financial data

C.

accessing multiple servers

D.

downloading more than 10 files

Question 7

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

Options:

A.

HIPAA

B.

PCI-DSS

C.

Sarbanes-Oxley

D.

GDPR

Question 8

According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

Options:

A.

Perform a vulnerability assessment

B.

Conduct a data protection impact assessment

C.

Conduct penetration testing

D.

Perform awareness testing

Question 9

Refer to the exhibit.

An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?

Options:

A.

a DOS MZ executable format

B.

a MS-DOS executable archive

C.

an archived malware

D.

a Windows executable file

Question 10

What is the difference between process orchestration and automation?

Options:

A.

Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.

B.

Orchestration arranges the tasks, while automation arranges processes.

C.

Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.

D.

Automation optimizes the individual tasks to execute the process, while orchestration optimizes frequent and repeatable processes.

Question 11

A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?

Options:

A.

Create a follow-up report based on the incident documentation.

B.

Perform a vulnerability assessment to find existing vulnerabilities.

C.

Eradicate malicious software from the infected machines.

D.

Collect evidence and maintain a chain-of-custody during further analysis.

Question 12

Drag and drop the function on the left onto the mechanism on the right.

Options:

Question 13

An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?

Options:

A.

chmod +x ex.sh

B.

source ex.sh

C.

chroot ex.sh

D.

sh ex.sh

Question 14

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

Options:

A.

Identify the business applications running on the assets

B.

Update software to patch third-party software

C.

Validate CSRF by executing exploits within Metasploit

D.

Fix applications according to the risk scores

Question 15

A SOC engineer discovers that the organization had three DDOS attacks overnight. Four servers are reported offline, even though the hardware seems to be working as expected. One of the offline servers is affecting the pay system reporting times. Three employees, including executive management, have reported ransomware on their laptops. Which steps help the engineer understand a comprehensive overview of the incident?

Options:

A.

Run and evaluate a full packet capture on the workloads, review SIEM logs, and define a root cause.

B.

Run and evaluate a full packet capture on the workloads, review SIEM logs, and plan mitigation steps.

C.

Check SOAR to learn what the security systems are reporting about the overnight events, research the attacks, and plan mitigation step.

D.

Check SOAR to know what the security systems are reporting about the overnight events, review the threat vectors, and define a root cause.

Question 16

A SOC analyst is notified by the network monitoring tool that there are unusual types of internal traffic on IP subnet 103.861.2117.0/24. The analyst discovers unexplained encrypted data files on a computer system that belongs on that specific subnet. What is the cause of the issue?

Options:

A.

DDoS attack

B.

phishing attack

C.

virus outbreak

D.

malware outbreak

Question 17

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

Options:

A.

X-Frame-Options

B.

X-XSS-Protection

C.

Content-Type

D.

Cache-Control