Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

350-201 Practice Questions

Performing CyberOps Using Core Security Technologies (CBRCOR)

Last Update 2 hours ago
Total Questions : 139

Dive into our fully updated and stable 350-201 practice test platform, featuring all the latest CyberOps Professional exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.

Our free CyberOps Professional practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 350-201. Use this test to pinpoint which areas you need to focus your study on.

350-201 PDF

350-201 PDF (Printable)
$48.3
$137.99

350-201 Testing Engine

350-201 PDF (Printable)
$52.5
$149.99

350-201 PDF + Testing Engine

350-201 PDF (Printable)
$65.45
$186.99
Question # 31

Refer to the exhibit.

Question # 31

How must these advisories be prioritized for handling?

Options:

A.  

The highest priority for handling depends on the type of institution deploying the devices

B.  

Vulnerability #2 is the highest priority for every type of institution

C.  

Vulnerability #1 and vulnerability #2 have the same priority

D.  

Vulnerability #1 is the highest priority for every type of institution

Discussion 0
Question # 32

Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)

Options:

A.  

Evaluate the intrusion detection system alerts to determine the threat source and attack surface.

B.  

Communicate with employees to determine who opened the link and isolate the affected assets.

C.  

Examine the firewall and HIPS configuration to identify the exploited vulnerabilities and apply recommended mitigation.

D.  

Review the mail server and proxy logs to identify the impact of a potential breach.

E.  

Check the email header to identify the sender and analyze the link in an isolated environment.

Discussion 0
Question # 33

Refer to the exhibit.

Question # 33

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options:

A.  

An attacker can initiate a DoS attack.

B.  

An attacker can read or change data.

C.  

An attacker can transfer data to an external server.

D.  

An attacker can modify the access logs.

Discussion 0
Question # 34

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?

Options:

A.  

Disable memory limit.

B.  

Disable CPU threshold trap toward the SNMP server.

C.  

Enable memory tracing notifications.

D.  

Enable memory threshold notifications.

Discussion 0
Question # 35

After a recent malware incident, the forensic investigator is gathering details to identify the breach and causes. The investigator has isolated the affected workstation. What is the next step that should be taken in this investigation?

Options:

A.  

Analyze the applications and services running on the affected workstation.

B.  

Compare workstation configuration and asset configuration policy to identify gaps.

C.  

Inspect registry entries for recently executed files.

D.  

Review audit logs for privilege escalation events.

Discussion 0
Question # 36

What is the impact of hardening machine images for deployment?

Options:

A.  

reduces the attack surface

B.  

increases the speed of patch deployment

C.  

reduces the steps needed to mitigate threats

D.  

increases the availability of threat alerts

Discussion 0
Question # 37

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to

prevent this type of attack from reoccurring? (Choose two.)

Options:

A.  

Implement a patch management process.

B.  

Scan the company server files for known viruses.

C.  

Apply existing patches to the company servers.

D.  

Automate antivirus scans of the company servers.

E.  

Define roles and responsibilities in the incident response playbook.

Discussion 0
Question # 38

A security incident affected an organization’s critical business services, and the customer-side web API became unresponsive and crashed. An investigation revealed a spike of API call requests and a high number of inactive sessions during the incident. Which two recommendations should the engineers make to prevent similar incidents in the future? (Choose two.)

Options:

A.  

Configure shorter timeout periods.

B.  

Determine API rate-limiting requirements.

C.  

Implement API key maintenance.

D.  

Automate server-side error reporting for customers.

E.  

Decrease simultaneous API responses.

Discussion 0
Question # 39

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

Options:

A.  

Disable BIND forwarding from the DNS server to avoid reconnaissance.

B.  

Disable affected assets and isolate them for further investigation.

C.  

Configure affected devices to disable NETRJS protocol.

D.  

Configure affected devices to disable the Finger service.

Discussion 0
Question # 40

How does Wireshark decrypt TLS network traffic?

Options:

A.  

with a key log file using per-session secrets

B.  

using an RSA public key

C.  

by observing DH key exchange

D.  

by defining a user-specified decode-as

Discussion 0
Get 350-201 dumps and pass your exam in 24 hours!

Free Exams Sample Questions