Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-201 - Performing CyberOps Using Core Security Technologies (CBRCOR)

Page: 4 / 5
Total 139 questions

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company’s infrastructure. Which steps should an engineer take at the recovery stage?

A.

Determine the systems involved and deploy available patches

B.

Analyze event logs and restrict network access

C.

Review access lists and require users to increase password complexity

D.

Identify the attack vector and update the IDS signature list

The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?

A.

eradication and recovery

B.

post-incident activity

C.

containment

D.

detection and analysis

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

A.

HIPAA

B.

PCI-DSS

C.

Sarbanes-Oxley

D.

GDPR

What is a principle of Infrastructure as Code?

A.

System maintenance is delegated to software systems

B.

Comprehensive initial designs support robust systems

C.

Scripts and manual configurations work together to ensure repeatable routines

D.

System downtime is grouped and scheduled across the infrastructure

What do 2xx HTTP response codes indicate for REST APIs?

A.

additional action must be taken by the client to complete the request

B.

the server takes responsibility for error status codes

C.

communication of transfer protocol-level information

D.

successful acceptance of the client’s request

What is a benefit of key risk indicators?

A.

clear perspective into the risk position of an organization

B.

improved visibility on quantifiable information

C.

improved mitigation techniques for unknown threats

D.

clear procedures and processes for organizational risk

An engineer wants to review the packet overviews of SNORT alerts. When printing the SNORT alerts, all the packet headers are included, and the file is too large to utilize. Which action is needed to correct this problem?

A.

Modify the alert rule to “output alert_syslog: output log”

B.

Modify the output module rule to “output alert_quick: output filename”

C.

Modify the alert rule to “output alert_syslog: output header”

D.

Modify the output module rule to “output alert_fast: output filename”

An analyst wants to upload an infected file containing sensitive information to a hybrid-analysis sandbox. According to the NIST.SP 800-150 guide to cyber threat information sharing, what is the analyst required to do before uploading the file to safeguard privacy?

A.

Verify hash integrity.

B.

Remove all personally identifiable information.

C.

Ensure the online sandbox is GDPR compliant.

D.

Lock the file to prevent unauthorized access.

How does Wireshark decrypt TLS network traffic?

A.

with a key log file using per-session secrets

B.

using an RSA public key

C.

by observing DH key exchange

D.

by defining a user-specified decode-as

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

A.

incident response playbooks

B.

asset vulnerability assessment

C.

report of staff members with asset relations

D.

key assets and executives

E.

malware analysis report