Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Exam Practice Test

Demo: 41 questions
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Question 1

A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The

hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

Options:

A.

Run and analyze the DLP Incident Summary Report from the Email Security Appliance

B.

Ask the company to execute the payload for real time analysis

C.

Investigate further in open source repositories using YARA to find matches

D.

Obtain a copy of the file for detonation in a sandbox

Question 2

Refer to the exhibit.

Which asset has the highest risk value?

Options:

A.

servers

B.

website

C.

payment process

D.

secretary workstation

Question 3

Refer to the exhibit.

Where is the MIME type that should be followed indicated?

Options:

A.

x-test-debug

B.

strict-transport-security

C.

x-xss-protection

D.

x-content-type-options

Question 4

Refer to the exhibit.

Which code snippet will parse the response to identify the status of the domain as malicious, clean or undefined?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 5

Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.

Options:

Question 6

An engineer is going through vulnerability triage with company management because of a recent malware outbreak from which 21 affected assets need to be patched or remediated. Management decides not to prioritize fixing the assets and accepts the vulnerabilities. What is the next step the engineer should take?

Options:

A.

Investigate the vulnerability to prevent further spread

B.

Acknowledge the vulnerabilities and document the risk

C.

Apply vendor patches or available hot fixes

D.

Isolate the assets affected in a separate network

Question 7

Refer to the exhibit.

Based on the detected vulnerabilities, what is the next recommended mitigation step?

Options:

A.

Evaluate service disruption and associated risk before prioritizing patches.

B.

Perform root cause analysis for all detected vulnerabilities.

C.

Remediate all vulnerabilities with descending CVSS score order.

D.

Temporarily shut down unnecessary services until patch deployment ends.

Question 8

Refer to the exhibit.

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options:

A.

An attacker can initiate a DoS attack.

B.

An attacker can read or change data.

C.

An attacker can transfer data to an external server.

D.

An attacker can modify the access logs.

Question 9

The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?

Options:

A.

eradication and recovery

B.

post-incident activity

C.

containment

D.

detection and analysis

Question 10

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?

Options:

A.

Contain the malware

B.

Install IPS software

C.

Determine the escalation path

D.

Perform vulnerability assessment

Question 11

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

Options:

A.

X-Frame-Options

B.

X-XSS-Protection

C.

Content-Type

D.

Cache-Control