cisco 350-201 practice test

performing cyberops using core security technologies (cbrcor)

Last exam update: Dec 15 ,2024
Page 1 out of 13. Viewing questions 1-10 out of 129

Question 1

Refer to the exhibit. A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

  • A. packet sniffer
  • B. malware analysis
  • C. SIEM
  • D. firewall manager
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?

  • A. aligning access control policies
  • B. exfiltration during data transfer
  • C. attack using default accounts
  • D. data exposure from backups
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

A security engineer discovers that a spreadsheet containing confidential information for nine of their employees was fraudulently posted on a competitor's website.
The spreadsheet contains names, salaries, and social security numbers. What is the next step the engineer should take in this investigation?

  • A. Determine if there is internal knowledge of this incident.
  • B. Check incoming and outgoing communications to identify spoofed emails.
  • C. Disconnect the network from Internet access to stop the phishing threats and regain control.
  • D. Engage the legal department to explore action against the competitor that posted the spreadsheet.
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?

  • A. Move the IPS to after the firewall facing the internal network
  • B. Move the IPS to before the firewall facing the outside network
  • C. Configure the proxy service on the IPS
  • D. Configure reverse port forwarding on the IPS
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5


Refer to the exhibit. Which data format is being used?

  • A. JSON
  • B. HTML
  • C. XML
  • D. CSV
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6


Refer to the exhibit. How must these advisories be prioritized for handling?

  • A. The highest priority for handling depends on the type of institution deploying the devices
  • B. Vulnerability #2 is the highest priority for every type of institution
  • C. Vulnerability #1 and vulnerability #2 have the same priority
  • D. Vulnerability #1 is the highest priority for every type of institution
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7


Refer to the exhibit. An engineer must tune the Cisco IOS device to mitigate an attack that is broadcasting a large number of ICMP packets. The attack is sending the victim's spoofed source IP to a network using an IP broadcast address that causes devices in the network to respond back to the source IP address. Which action does the engineer recommend?

  • A. Use command ip verify reverse-path interface
  • B. Use global configuration command service tcp-keepalives-out
  • C. Use subinterface command no ip directed-broadcast
  • D. Use logging trap 6
Answer:

a


Reference:
https://www.ccexpert.us/pix-firewall/ip-verify-reversepath-command.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8


Refer to the exhibit. Which code snippet will parse the response to identify the status of the domain as malicious, clean or undefined?
A.

B.

C.

D.

Answer:

c

Discussions
0 / 1000

Question 9

A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company's confidential document management folder using a company-owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments. What are the actions a security manager should take?

  • A. Measure confidentiality level of downloaded documents.
  • B. Report to the incident response team.
  • C. Escalate to contractor's manager.
  • D. Communicate with the contractor to identify the motives.
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

DRAG DROP Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.
Select and Place:

Answer:


Reference:
https://www.densify.com/resources/continuous-integration-delivery-phases

Discussions
0 / 1000
To page 2