Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Exam Practice Test

Page: 1 / 14
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior. Which type of compromise is occurring?

Options:

A.

compromised insider

B.

compromised root access

C.

compromised database tables

D.

compromised network

Question 2

Refer to the exhibit.

Question # 2

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?

Options:

A.

Use VLANs to segregate zones and the firewall to allow only required services and secured protocols

B.

Deploy a SOAR solution and correlate log alerts from customer zones

C.

Deploy IDS within sensitive areas and continuously update signatures

D.

Use syslog to gather data from multiple sources and detect intrusion logs for timely responses

Question 3

What is a benefit of key risk indicators?

Options:

A.

clear perspective into the risk position of an organization

B.

improved visibility on quantifiable information

C.

improved mitigation techniques for unknown threats

D.

clear procedures and processes for organizational risk

Question 4

What is the difference between process orchestration and automation?

Options:

A.

Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.

B.

Orchestration arranges the tasks, while automation arranges processes.

C.

Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.

D.

Automation optimizes the individual tasks to execute the process, while orchestration optimizes frequent and repeatable processes.

Question 5

An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default

administrator account login. Which step should an engineer take after receiving this alert?

Options:

A.

Initiate a triage meeting to acknowledge the vulnerability and its potential impact

B.

Determine company usage of the affected products

C.

Search for a patch to install from the vendor

D.

Implement restrictions within the VoIP VLANS

Question 6

Refer to the exhibit.

Question # 6

What is the connection status of the ICMP event?

Options:

A.

blocked by a configured access policy rule

B.

allowed by a configured access policy rule

C.

blocked by an intrusion policy rule

D.

allowed in the default action

Question 7

The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?

Options:

A.

eradication and recovery

B.

post-incident activity

C.

containment

D.

detection and analysis

Question 8

A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?

Options:

A.

Create a rule triggered by 3 failed VPN connection attempts in an 8-hour period

B.

Create a rule triggered by 1 successful VPN connection from any nondestination country

C.

Create a rule triggered by multiple successful VPN connections from the destination countries

D.

Analyze the logs from all countries related to this user during the traveling period

Question 9

Refer to the exhibit.

Question # 9

An employee is a victim of a social engineering phone call and installs remote access software to allow an “MS Support” technician to check his machine for malware. The employee becomes suspicious after the remote technician requests payment in the form of gift cards. The employee has copies of multiple, unencrypted database files, over 400 MB each, on his system and is worried that the scammer copied the files off but has no proof of it. The remote technician was connected sometime between 2:00 pm and 3:00 pm over https. What should be determined regarding data loss between the employee’s laptop and the remote technician’s system?

Options:

A.

No database files were disclosed

B.

The database files were disclosed

C.

The database files integrity was violated

D.

The database files were intentionally corrupted, and encryption is possible

Question 10

Which action should be taken when the HTTP response code 301 is received from a web application?

Options:

A.

Update the cached header metadata.

B.

Confirm the resource’s location.

C.

Increase the allowed user limit.

D.

Modify the session timeout setting.

Question 11

An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?

Options:

A.

chmod +x ex.sh

B.

source ex.sh

C.

chroot ex.sh

D.

sh ex.sh

Question 12

What is idempotence?

Options:

A.

the assurance of system uniformity throughout the whole delivery process

B.

the ability to recover from failures while keeping critical services running

C.

the necessity of setting maintenance of individual deployment environments

D.

the ability to set the target environment configuration regardless of the starting state

Question 13

Refer to the exhibit.

Question # 13

Which indicator of compromise is represented by this STIX?

Options:

A.

website redirecting traffic to ransomware server

B.

website hosting malware to download files

C.

web server vulnerability exploited by malware

D.

cross-site scripting vulnerability to backdoor server

Question 14

A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The

hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

Options:

A.

Run and analyze the DLP Incident Summary Report from the Email Security Appliance

B.

Ask the company to execute the payload for real time analysis

C.

Investigate further in open source repositories using YARA to find matches

D.

Obtain a copy of the file for detonation in a sandbox

Question 15

Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.

Question # 15

Options:

Question 16

Refer to the exhibit.

Question # 16

An engineer received multiple reports from employees unable to log into systems with the error: The Group Policy Client service failed to logon – Access is denied. Through further analysis, the engineer discovered several unexpected modifications to system settings. Which type of breach is occurring?

Options:

A.

malware break

B.

data theft

C.

elevation of privileges

D.

denial-of-service

Question 17

An analyst received multiple alerts on the SIEM console of users that are navigating to malicious URLs. The analyst needs to automate the task of receiving alerts and processing the data for further investigations. Three variables are available from the SIEM console to include in an automation script: console_ip, api_token, and reference_set_name. What must be added to this script to receive a successful HTTP response?

#!/usr/bin/python import sys import requests

Options:

A.

{1}, {2}

B.

{1}, {3}

C.

console_ip, api_token

D.

console_ip, reference_set_name

Question 18

Refer to the exhibit.

Question # 18

For IP 192.168.1.209, what are the risk level, activity, and next step?

Options:

A.

high risk level, anomalous periodic communication, quarantine with antivirus

B.

critical risk level, malicious server IP, run in a sandboxed environment

C.

critical risk level, data exfiltration, isolate the device

D.

high risk level, malicious host, investigate further

Question 19

An engineer is going through vulnerability triage with company management because of a recent malware outbreak from which 21 affected assets need to be patched or remediated. Management decides not to prioritize fixing the assets and accepts the vulnerabilities. What is the next step the engineer should take?

Options:

A.

Investigate the vulnerability to prevent further spread

B.

Acknowledge the vulnerabilities and document the risk

C.

Apply vendor patches or available hot fixes

D.

Isolate the assets affected in a separate network

Question 20

Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.

Question # 20

Options:

Question 21

The SIEM tool informs a SOC team of a suspicious file. The team initializes the analysis with an automated sandbox tool, sets up a controlled laboratory to examine the malware specimen, and proceeds with behavioral analysis. What is the next step in the malware analysis process?

Options:

A.

Perform static and dynamic code analysis of the specimen.

B.

Unpack the specimen and perform memory forensics.

C.

Contain the subnet in which the suspicious file was found.

D.

Document findings and clean-up the laboratory.

Question 22

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company’s infrastructure. Which steps should an engineer take at the recovery stage?

Options:

A.

Determine the systems involved and deploy available patches

B.

Analyze event logs and restrict network access

C.

Review access lists and require users to increase password complexity

D.

Identify the attack vector and update the IDS signature list

Question 23

Refer to the exhibit.

Question # 23

A threat actor behind a single computer exploited a cloud-based application by sending multiple concurrent API requests. These requests made the application unresponsive. Which solution protects the application from being overloaded and ensures more equitable application access across the end-user community?

Options:

A.

Limit the number of API calls that a single client is allowed to make

B.

Add restrictions on the edge router on how often a single client can access the API

C.

Reduce the amount of data that can be fetched from the total pool of active clients that call the API

D.

Increase the application cache of the total pool of active clients that call the API

Question 24

Refer to the exhibit.

Question # 24

Where are the browser page rendering permissions displayed?

Options:

A.

x-frame-options

B.

x-xss-protection

C.

x-content-type-options

D.

x-test-debug