Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 350-201 Dumps

Page: 1 / 14
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Question 1

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

Options:

A.

Run the program through a debugger to see the sequential actions

B.

Unpack the file in a sandbox to see how it reacts

C.

Research the malware online to see if there are noted findings

D.

Disassemble the malware to understand how it was constructed

Question 2

Refer to the exhibit.

as

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?

Options:

A.

Use VLANs to segregate zones and the firewall to allow only required services and secured protocols

B.

Deploy a SOAR solution and correlate log alerts from customer zones

C.

Deploy IDS within sensitive areas and continuously update signatures

D.

Use syslog to gather data from multiple sources and detect intrusion logs for timely responses

Question 3

Refer to the exhibit.

as

Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

Options:

A.

Create an ACL on the firewall to allow only TLS 1.3

B.

Implement a proxy server in the DMZ network

C.

Create an ACL on the firewall to allow only external connections

D.

Move the webserver to the internal network

Question 4

A SIEM tool fires an alert about a VPN connection attempt from an unusual location. The incident response team validates that an attacker has installed a remote access tool on a user’s laptop while traveling. The attacker has the user’s credentials and is attempting to connect to the network.

What is the next step in handling the incident?

Options:

A.

Block the source IP from the firewall

B.

Perform an antivirus scan on the laptop

C.

Identify systems or services at risk

D.

Identify lateral movement

Question 5

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Options:

A.

Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.

B.

Identify who installed the application by reviewing the logs and gather a user access log from the HR department.

C.

Verify user credentials on the affected asset, modify passwords, and confirm available patches and updates are installed.

D.

Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.

Question 6

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

Options:

A.

HIPAA

B.

PCI-DSS

C.

Sarbanes-Oxley

D.

GDPR

Question 7

Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.

as

Options:

Question 8

Refer to the exhibit.

as

An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?

Options:

A.

a DOS MZ executable format

B.

a MS-DOS executable archive

C.

an archived malware

D.

a Windows executable file

Question 9

The SIEM tool informs a SOC team of a suspicious file. The team initializes the analysis with an automated sandbox tool, sets up a controlled laboratory to examine the malware specimen, and proceeds with behavioral analysis. What is the next step in the malware analysis process?

Options:

A.

Perform static and dynamic code analysis of the specimen.

B.

Unpack the specimen and perform memory forensics.

C.

Contain the subnet in which the suspicious file was found.

D.

Document findings and clean-up the laboratory.

Question 10

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?

Options:

A.

use of the Nmap tool to identify the vulnerability when the new code was deployed

B.

implementation of a firewall and intrusion detection system

C.

implementation of an endpoint protection system

D.

use of SecDevOps to detect the vulnerability during development

Question 11

The physical security department received a report that an unauthorized person followed an authorized individual to enter a secured premise. The incident was documented and given to a security specialist to analyze. Which step should be taken at this stage?

Options:

A.

Determine the assets to which the attacker has access

B.

Identify assets the attacker handled or acquired

C.

Change access controls to high risk assets in the enterprise

D.

Identify movement of the attacker in the enterprise

Question 12

Refer to the exhibit.

as

Which indicator of compromise is represented by this STIX?

Options:

A.

website redirecting traffic to ransomware server

B.

website hosting malware to download files

C.

web server vulnerability exploited by malware

D.

cross-site scripting vulnerability to backdoor server

Question 13

Drag and drop the telemetry-related considerations from the left onto their cloud service models on the right.

as

Options:

Question 14

Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

as

Options:

Question 15

Refer to the exhibit.

as

Where does it signify that a page will be stopped from loading when a scripting attack is detected?

Options:

A.

x-frame-options

B.

x-content-type-options

C.

x-xss-protection

D.

x-test-debug