Exam Code | 350-201 |
Exam Name | Performing CyberOps Using Core Security Technologies (CBRCOR) |
Questions | 139 Questions Answers With Explanation |
Update Date | November 08,2024 |
Price |
Was : |
Are you ready to take your career to the next level with Performing CyberOps Using Core Security Technologies (CBRCOR)? At Prep4Certs, we're dedicated to helping you achieve your goals by providing high-quality 350-201 Dumps and resources for a wide range of certification exams.
At Prep4Certs, we're committed to your success in the Cisco 350-201 exam. Our comprehensive study materials and resources are designed to equip you with the knowledge and skills needed to ace the exam with confidence:
Start Your Certification Journey Today
Whether you're looking to advance your career, expand your skill set, or pursue new opportunities, Prep4Certs is here to support you on your certification journey. Explore our comprehensive study materials, take your exam preparation to the next level, and unlock new possibilities for professional growth and success.
Ready to achieve your certification goals? Begin your journey with Prep4Certs today!
An engineer is investigating several cases of increased incoming spam emails andsuspicious emails from the HR and service departments. While checking the eventsources, the website monitoring tool showed several web scraping alerts overnight. Whichtype of compromise is indicated?
A. phishing
B. dumpster diving
C. social engineering
D. privilege escalation
An analyst wants to upload an infected file containing sensitive information to a hybridanalysis sandbox. According to the NIST.SP 800-150 guide to cyber threat informationsharing, what is the analyst required to do before uploading the file to safeguard privacy?
A. Verify hash integrity.
B. Remove all personally identifiable information.
C. Ensure the online sandbox is GDPR compliant.
D. Lock the file to prevent unauthorized access.
According to GDPR, what should be done with data to ensure its confidentiality, integrity,and availability?
A. Perform a vulnerability assessment
B. Conduct a data protection impact assessment
C. Conduct penetration testing
D. Perform awareness testing
An engineer is analyzing a possible compromise that happened a week ago when thecompany ? (Choose two.)
A. firewall
B. Wireshark
C. autopsy
D. SHA512
E. IPS
A. Block list of internal IPs from the rule
B. Change the rule content match to case sensitive
C. Set the rule to track the source IP
D. Tune the count and seconds threshold of the rule
A. Limit the number of API calls that a single client is allowed to make
B. Add restrictions on the edge router on how often a single client can access the API
C. Reduce the amount of data that can be fetched from the total pool of active clients thatcall the API
D. Increase the application cache of the total pool of active clients that call the API
A. NetFlow and event data
B. event data and syslog data
C. SNMP and syslog data
D. NetFlow and SNMP
The incident response team receives information about the abnormal behavior of a host. Amalicious file is found being executed from an external USB flash drive. The team collectsand documents all the necessary evidence from the computing resource. What is the nextstep?
A. Conduct a risk assessment of systems and applications
B. Isolate the infected host from the rest of the subnet
C. Install malware prevention software on the host
D. Analyze network traffic on the host’s subnet
A SOC analyst is investigating a recent email delivered to a high-value user for a customerwhose network their organization monitors. The email includes a suspicious attachmenttitled “Invoice RE: 0004489”. Thehash of the file is gathered from the Cisco Email Security Appliance. After searching OpenSource Intelligence, no available history of this hash is found anywhere on the web. Whatis the next step in analyzing this attachment to allow the analyst to gather indicators ofcompromise?
A. Run and analyze the DLP Incident Summary Report from the Email Security Appliance
B. Ask the company to execute the payload for real time analysis
C. Investigate further in open source repositories using YARA to find matches
D. Obtain a copy of the file for detonation in a sandbox
Which command does an engineer use to set read/write/execute access on a folder foreveryone who reaches the resource?
A. chmod 666
B. chmod 774
C. chmod 775
D. chmod 777