Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Questions 4

Refer to the exhibit.

Which asset has the highest risk value?

Options:

A.

servers

B.

website

C.

payment process

D.

secretary workstation

Buy Now
Questions 5

Refer to the exhibit.

An organization is using an internal application for printing documents that requires a separate registration on the website. The application allows format-free user creation, and users must match these required conditions to comply with the company’s user creation policy:

  • minimum length: 3
  • usernames can only use letters, numbers, dots, and underscores
  • usernames cannot begin with a number

The application administrator has to manually change and track these daily to ensure compliance. An engineer is tasked to implement a script to automate the process according to the company user creation policy. The engineer implemented this piece of code within the application, but users are still able to create format-free usernames. Which change is needed to apply the restrictions?

Options:

A.

modify code to return error on restrictions def return false_user(username, minlen)

B.

automate the restrictions def automate_user(username, minlen)

C.

validate the restrictions, def validate_user(username, minlen)

D.

modify code to force the restrictions, def force_user(username, minlen)

Buy Now
Questions 6

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Options:

A.

Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.

B.

Identify who installed the application by reviewing the logs and gather a user access log from the HR department.

C.

Verify user credentials on the affected asset, modify passwords, and confirm available patches and updates are installed.

D.

Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.

Buy Now
Questions 7

Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

Options:

Buy Now
Questions 8

Refer to the exhibit.

How must these advisories be prioritized for handling?

Options:

A.

The highest priority for handling depends on the type of institution deploying the devices

B.

Vulnerability #2 is the highest priority for every type of institution

C.

Vulnerability #1 and vulnerability #2 have the same priority

D.

Vulnerability #1 is the highest priority for every type of institution

Buy Now
Questions 9

How does Wireshark decrypt TLS network traffic?

Options:

A.

with a key log file using per-session secrets

B.

using an RSA public key

C.

by observing DH key exchange

D.

by defining a user-specified decode-as

Buy Now
Questions 10

Refer to the exhibit.

Where does it signify that a page will be stopped from loading when a scripting attack is detected?

Options:

A.

x-frame-options

B.

x-content-type-options

C.

x-xss-protection

D.

x-test-debug

Buy Now
Questions 11

Drag and drop the function on the left onto the mechanism on the right.

Options:

Buy Now
Questions 12

What is the impact of hardening machine images for deployment?

Options:

A.

reduces the attack surface

B.

increases the speed of patch deployment

C.

reduces the steps needed to mitigate threats

D.

increases the availability of threat alerts

Buy Now
Questions 13

An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?

Options:

A.

HIPAA

B.

FISMA

C.

COBIT

D.

PCI DSS

Buy Now
Questions 14

Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.

Options:

Buy Now
Questions 15

A company launched an e-commerce website with multiple points of sale through internal and external e- stores. Customers access the stores from the public website, and employees access the stores from the intranet with an SSO. Which action is needed to comply with PCI standards for hardening the systems?

Options:

A.

Mask PAN numbers

B.

Encrypt personal data

C.

Encrypt access

D.

Mask sales details

Buy Now
Questions 16

A patient views information that is not theirs when they sign in to the hospital’s online portal. The patient calls the support center at the hospital but continues to be put on hold because other patients are experiencing the same issue. An incident has been declared, and an engineer is now on the incident bridge as the CyberOps Tier 3 Analyst. There is a concern about the disclosure of PII occurring in real-time. What is the first step the analyst should take to address this incident?

Options:

A.

Evaluate visibility tools to determine if external access resulted in tampering

B.

Contact the third-party handling provider to respond to the incident as critical

C.

Turn off all access to the patient portal to secure patient records

D.

Review system and application logs to identify errors in the portal code

Buy Now
Questions 17

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

Options:

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Buy Now
Questions 18

A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The

hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

Options:

A.

Run and analyze the DLP Incident Summary Report from the Email Security Appliance

B.

Ask the company to execute the payload for real time analysis

C.

Investigate further in open source repositories using YARA to find matches

D.

Obtain a copy of the file for detonation in a sandbox

Buy Now
Questions 19

Refer to the exhibit.

The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

Options:

Buy Now
Questions 20

Refer to the exhibit.

Cisco Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a Quarantine VLAN using Adaptive Network Control policy. Which telemetry feeds were correlated with SMC to identify the malware?

Options:

A.

NetFlow and event data

B.

event data and syslog data

C.

SNMP and syslog data

D.

NetFlow and SNMP

Buy Now
Exam Code: 350-201
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: May 4, 2024
Questions: 139

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90