Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 591klB651

350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Questions 4

Which action should be taken when the HTTP response code 301 is received from a web application?

Options:

A.

Update the cached header metadata.

B.

Confirm the resource’s location.

C.

Increase the allowed user limit.

D.

Modify the session timeout setting.

Buy Now
Questions 5

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

Options:

A.

Analyze environmental threats and causes

B.

Inform the product security incident response team to investigate further

C.

Analyze the precursors and indicators

D.

Inform the computer security incident response team to investigate further

Buy Now
Questions 6

An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?

Options:

A.

Move the IPS to after the firewall facing the internal network

B.

Move the IPS to before the firewall facing the outside network

C.

Configure the proxy service on the IPS

D.

Configure reverse port forwarding on the IPS

Buy Now
Questions 7

Refer to the exhibit.

350-201 Question 7

Which command was executed in PowerShell to generate this log?

Options:

A.

Get-EventLog -LogName*

B.

Get-EventLog -List

C.

Get-WinEvent -ListLog* -ComputerName localhost

D.

Get-WinEvent -ListLog*

Buy Now
Questions 8

Refer to the exhibit.

350-201 Question 8

An engineer received multiple reports from employees unable to log into systems with the error: The Group Policy Client service failed to logon – Access is denied. Through further analysis, the engineer discovered several unexpected modifications to system settings. Which type of breach is occurring?

Options:

A.

malware break

B.

data theft

C.

elevation of privileges

D.

denial-of-service

Buy Now
Questions 9

Refer to the exhibit.

350-201 Question 9

How are tokens authenticated when the REST API on a device is accessed from a REST API client?

Options:

A.

The token is obtained by providing a password. The REST client requests access to a resource using the access token. The REST API validates the access token and gives access to the resource.

B.

The token is obtained by providing a password. The REST API requests access to a resource using the access token, validates the access token, and gives access to the resource.

C.

The token is obtained before providing a password. The REST API provides resource access, refreshes

tokens, and returns them to the REST client. The REST client requests access to a resource using the access token.

D.

The token is obtained before providing a password. The REST client provides access to a resource using the access token. The REST API encrypts the access token and gives access to the resource.

Buy Now
Questions 10

A company recently started accepting credit card payments in their local warehouses and is undergoing a PCI audit. Based on business requirements, the company needs to store sensitive authentication data for 45 days. How must data be stored for compliance?

Options:

A.

post-authorization by non-issuing entities if there is a documented business justification

B.

by entities that issue the payment cards or that perform support issuing services

C.

post-authorization by non-issuing entities if the data is encrypted and securely stored

D.

by issuers and issuer processors if there is a legitimate reason

Buy Now
Questions 11

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

Options:

A.

Disable BIND forwarding from the DNS server to avoid reconnaissance.

B.

Disable affected assets and isolate them for further investigation.

C.

Configure affected devices to disable NETRJS protocol.

D.

Configure affected devices to disable the Finger service.

Buy Now
Questions 12

Refer to the exhibit.

350-201 Question 12

At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

Options:

A.

exploitation

B.

actions on objectives

C.

delivery

D.

reconnaissance

Buy Now
Questions 13

Refer to the exhibit.

350-201 Question 13

The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

350-201 Question 13

Options:

Buy Now
Questions 14

A customer is using a central device to manage network devices over SNMPv2. A remote attacker caused a denial of service condition and can trigger this vulnerability by issuing a GET request for the ciscoFlashMIB OID on an affected device. Which should be disabled to resolve the issue?

Options:

A.

SNMPv2

B.

TCP small services

C.

port UDP 161 and 162

D.

UDP small services

Buy Now
Questions 15

Refer to the exhibit.

350-201 Question 15

Where is the MIME type that should be followed indicated?

Options:

A.

x-test-debug

B.

strict-transport-security

C.

x-xss-protection

D.

x-content-type-options

Buy Now
Questions 16

Refer to the exhibit.

350-201 Question 16

IDS is producing an increased amount of false positive events about brute force attempts on the organization’s mail server. How should the Snort rule be modified to improve performance?

Options:

A.

Block list of internal IPs from the rule

B.

Change the rule content match to case sensitive

C.

Set the rule to track the source IP

D.

Tune the count and seconds threshold of the rule

Buy Now
Questions 17

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to

prevent this type of attack from reoccurring? (Choose two.)

Options:

A.

Implement a patch management process.

B.

Scan the company server files for known viruses.

C.

Apply existing patches to the company servers.

D.

Automate antivirus scans of the company servers.

E.

Define roles and responsibilities in the incident response playbook.

Buy Now
Questions 18

A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?

Options:

A.

Create a rule triggered by 3 failed VPN connection attempts in an 8-hour period

B.

Create a rule triggered by 1 successful VPN connection from any nondestination country

C.

Create a rule triggered by multiple successful VPN connections from the destination countries

D.

Analyze the logs from all countries related to this user during the traveling period

Buy Now
Questions 19

How does Wireshark decrypt TLS network traffic?

Options:

A.

with a key log file using per-session secrets

B.

using an RSA public key

C.

by observing DH key exchange

D.

by defining a user-specified decode-as

Buy Now
Questions 20

What is the purpose of hardening systems?

Options:

A.

to securely configure machines to limit the attack surface

B.

to create the logic that triggers alerts when anomalies occur

C.

to identify vulnerabilities within an operating system

D.

to analyze attacks to identify threat actors and points of entry

Buy Now
Exam Code: 350-201
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Apr 17, 2024
Questions: 139

PDF + Testing Engine

$68  $169.99

Testing Engine

$52  $129.99
buy now 350-201 testing engine

PDF (Q&A)

$44  $109.99
buy now 350-201 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 19 Apr 2024