Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-201 - Performing CyberOps Using Core Security Technologies (CBRCOR)

Page: 1 / 5
Total 139 questions

Refer to the exhibit.

A threat actor behind a single computer exploited a cloud-based application by sending multiple concurrent API requests. These requests made the application unresponsive. Which solution protects the application from being overloaded and ensures more equitable application access across the end-user community?

A.

Limit the number of API calls that a single client is allowed to make

B.

Add restrictions on the edge router on how often a single client can access the API

C.

Reduce the amount of data that can be fetched from the total pool of active clients that call the API

D.

Increase the application cache of the total pool of active clients that call the API

Refer to the exhibit.

What is the threat in this Wireshark traffic capture?

A.

A high rate of SYN packets being sent from multiple sources toward a single destination IP

B.

A flood of ACK packets coming from a single source IP to multiple destination IPs

C.

A high rate of SYN packets being sent from a single source IP toward multiple destination IPs

D.

A flood of SYN packets coming from a single source IP to a single destination IP

Drag and drop the function on the left onto the mechanism on the right.

An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?

A.

HIPAA

B.

FISMA

C.

COBIT

D.

PCI DSS

A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?

A.

IaaS

B.

PaaS

C.

DaaS

D.

SaaS

An engineer is investigating several cases of increased incoming spam emails and suspicious emails from the HR and service departments. While checking the event sources, the website monitoring tool showed several web scraping alerts overnight. Which type of compromise is indicated?

A.

phishing

B.

dumpster diving

C.

social engineering

D.

privilege escalation

Refer to the exhibit.

Based on the detected vulnerabilities, what is the next recommended mitigation step?

A.

Evaluate service disruption and associated risk before prioritizing patches.

B.

Perform root cause analysis for all detected vulnerabilities.

C.

Remediate all vulnerabilities with descending CVSS score order.

D.

Temporarily shut down unnecessary services until patch deployment ends.

Refer to the exhibit.

At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

A.

exploitation

B.

actions on objectives

C.

delivery

D.

reconnaissance

Refer to the exhibit.

An employee is a victim of a social engineering phone call and installs remote access software to allow an “MS Support” technician to check his machine for malware. The employee becomes suspicious after the remote technician requests payment in the form of gift cards. The employee has copies of multiple, unencrypted database files, over 400 MB each, on his system and is worried that the scammer copied the files off but has no proof of it. The remote technician was connected sometime between 2:00 pm and 3:00 pm over https. What should be determined regarding data loss between the employee’s laptop and the remote technician’s system?

A.

No database files were disclosed

B.

The database files were disclosed

C.

The database files integrity was violated

D.

The database files were intentionally corrupted, and encryption is possible

An engineer notices that unauthorized software was installed on the network and discovers that it was installed by a dormant user account. The engineer suspects an escalation of privilege attack and responds to the incident. Drag and drop the activities from the left into the order for the response on the right.