Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-201 - Performing CyberOps Using Core Security Technologies (CBRCOR)

Page: 3 / 5
Total 139 questions

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

A.

domain belongs to a competitor

B.

log in during non-working hours

C.

email forwarding to an external domain

D.

log in from a first-seen country

E.

increased number of sent mails

What is a limitation of cyber security risk insurance?

A.

It does not cover the costs to restore stolen identities as a result of a cyber attack

B.

It does not cover the costs to hire forensics experts to analyze the cyber attack

C.

It does not cover the costs of damage done by third parties as a result of a cyber attack

D.

It does not cover the costs to hire a public relations company to help deal with a cyber attack

Which command does an engineer use to set read/write/execute access on a folder for everyone who reaches the resource?

A.

chmod 666

B.

chmod 774

C.

chmod 775

D.

chmod 777

What is the HTTP response code when the REST API information requested by the authenticated user cannot be found?

A.

401

B.

402

C.

403

D.

404

E.

405

Refer to the exhibit.

What is the connection status of the ICMP event?

A.

blocked by a configured access policy rule

B.

allowed by a configured access policy rule

C.

blocked by an intrusion policy rule

D.

allowed in the default action

Refer to the exhibit.

An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?

A.

Top Peers

B.

Top Hosts

C.

Top Conversations

D.

Top Ports

A payroll administrator noticed unexpected changes within a piece of software and reported the incident to the incident response team. Which actions should be taken at this step in the incident response workflow?

A.

Classify the criticality of the information, research the attacker’s motives, and identify missing patches

B.

Determine the damage to the business, extract reports, and save evidence according to a chain of custody

C.

Classify the attack vector, understand the scope of the event, and identify the vulnerabilities being exploited

D.

Determine the attack surface, evaluate the risks involved, and communicate the incident according to the escalation plan

An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?

A.

ExecutedMalware.ioc

B.

Crossrider.ioc

C.

ConnectToSuspiciousDomain.ioc

D.

W32 AccesschkUtility.ioc

Refer to the exhibit.

IDS is producing an increased amount of false positive events about brute force attempts on the organization’s mail server. How should the Snort rule be modified to improve performance?

A.

Block list of internal IPs from the rule

B.

Change the rule content match to case sensitive

C.

Set the rule to track the source IP

D.

Tune the count and seconds threshold of the rule

A Mac laptop user notices that several files have disappeared from their laptop documents folder. While looking for the files, the user notices that the browser history was recently cleared. The user raises a case, and an analyst reviews the network usage and discovers that it is abnormally high. Which step should be taken to continue the investigation?

A.

Run the sudo sysdiagnose command

B.

Run the sh command

C.

Run the w command

D.

Run the who command