Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-201 - Performing CyberOps Using Core Security Technologies (CBRCOR)

Page: 2 / 5
Total 139 questions

Refer to the exhibit.

Where is the MIME type that should be followed indicated?

A.

x-test-debug

B.

strict-transport-security

C.

x-xss-protection

D.

x-content-type-options

Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?

A.

Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack

B.

Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities

C.

Review the server backup and identify server content and data criticality to assess the intrusion risk

D.

Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious

An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?

A.

aligning access control policies

B.

exfiltration during data transfer

C.

attack using default accounts

D.

data exposure from backups

An engineer is analyzing a possible compromise that happened a week ago when the company? (Choose two.)

A.

firewall

B.

Wireshark

C.

autopsy

D.

SHA512

E.

IPS

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine. What should be concluded from this report?

A.

Threat scores are high, malicious ransomware has been detected, and files have been modified

B.

Threat scores are low, malicious ransomware has been detected, and files have been modified

C.

Threat scores are high, malicious activity is detected, but files have not been modified

D.

Threat scores are low and no malicious file activity is detected

Refer to the exhibit.

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?

A.

Use VLANs to segregate zones and the firewall to allow only required services and secured protocols

B.

Deploy a SOAR solution and correlate log alerts from customer zones

C.

Deploy IDS within sensitive areas and continuously update signatures

D.

Use syslog to gather data from multiple sources and detect intrusion logs for timely responses

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

A.

Allow list only authorized hosts to contact the application’s IP at a specific port.

B.

Allow list HTTP traffic through the corporate VLANS.

C.

Allow list traffic to application’s IP from the internal network at a specific port.

D.

Allow list only authorized hosts to contact the application’s VLAN.

Refer to the exhibit.

Which code snippet will parse the response to identify the status of the domain as malicious, clean or undefined?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the incident response team to block the malicious URLs requested on the firewall. Which action will improve the effectiveness of the process?

A.

Block local to remote HTTP/HTTPS requests on the firewall for users who triggered the rule.

B.

Inform the user by enabling an automated email response when the rule is triggered.

C.

Inform the incident response team by enabling an automated email response when the rule is triggered.

D.

Create an automation script for blocking URLs on the firewall when the rule is triggered.