Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Questions 4

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

Options:

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Buy Now
Questions 5

Refer to the exhibit.

IDS is producing an increased amount of false positive events about brute force attempts on the organization’s mail server. How should the Snort rule be modified to improve performance?

Options:

A.

Block list of internal IPs from the rule

B.

Change the rule content match to case sensitive

C.

Set the rule to track the source IP

D.

Tune the count and seconds threshold of the rule

Buy Now
Questions 6

An engineer returned to work and realized that payments that were received over the weekend were sent to the wrong recipient. The engineer discovered that the SaaS tool that processes these payments was down over the weekend. Which step should the engineer take first?

Options:

A.

Utilize the SaaS tool team to gather more information on the potential breach

B.

Contact the incident response team to inform them of a potential breach

C.

Organize a meeting to discuss the services that may be affected

D.

Request that the purchasing department creates and sends the payments manually

Buy Now
Questions 7

Refer to the exhibit.

Which data format is being used?

Options:

A.

JSON

B.

HTML

C.

XML

D.

CSV

Buy Now
Questions 8

A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?

Options:

A.

Create a rule triggered by 3 failed VPN connection attempts in an 8-hour period

B.

Create a rule triggered by 1 successful VPN connection from any nondestination country

C.

Create a rule triggered by multiple successful VPN connections from the destination countries

D.

Analyze the logs from all countries related to this user during the traveling period

Buy Now
Questions 9

What is idempotence?

Options:

A.

the assurance of system uniformity throughout the whole delivery process

B.

the ability to recover from failures while keeping critical services running

C.

the necessity of setting maintenance of individual deployment environments

D.

the ability to set the target environment configuration regardless of the starting state

Buy Now
Questions 10

Refer to the exhibit.

Where is the MIME type that should be followed indicated?

Options:

A.

x-test-debug

B.

strict-transport-security

C.

x-xss-protection

D.

x-content-type-options

Buy Now
Questions 11

Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.

Options:

Buy Now
Questions 12

An engineer is investigating several cases of increased incoming spam emails and suspicious emails from the HR and service departments. While checking the event sources, the website monitoring tool showed several web scraping alerts overnight. Which type of compromise is indicated?

Options:

A.

phishing

B.

dumpster diving

C.

social engineering

D.

privilege escalation

Buy Now
Questions 13

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?

Options:

A.

use of the Nmap tool to identify the vulnerability when the new code was deployed

B.

implementation of a firewall and intrusion detection system

C.

implementation of an endpoint protection system

D.

use of SecDevOps to detect the vulnerability during development

Buy Now
Questions 14

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

Options:

A.

Allow list only authorized hosts to contact the application’s IP at a specific port.

B.

Allow list HTTP traffic through the corporate VLANS.

C.

Allow list traffic to application’s IP from the internal network at a specific port.

D.

Allow list only authorized hosts to contact the application’s VLAN.

Buy Now
Questions 15

What is a principle of Infrastructure as Code?

Options:

A.

System maintenance is delegated to software systems

B.

Comprehensive initial designs support robust systems

C.

Scripts and manual configurations work together to ensure repeatable routines

D.

System downtime is grouped and scheduled across the infrastructure

Buy Now
Questions 16

A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks. Which standard must the architect apply?

Options:

A.

IEC62446

B.

IEC62443

C.

IEC62439-3

D.

IEC62439-2

Buy Now
Questions 17

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

Options:

A.

Analyze environmental threats and causes

B.

Inform the product security incident response team to investigate further

C.

Analyze the precursors and indicators

D.

Inform the computer security incident response team to investigate further

Buy Now
Questions 18

A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company’s confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments. What are the actions a security manager should take?

Options:

A.

Measure confidentiality level of downloaded documents.

B.

Report to the incident response team.

C.

Escalate to contractor’s manager.

D.

Communicate with the contractor to identify the motives.

Buy Now
Questions 19

A payroll administrator noticed unexpected changes within a piece of software and reported the incident to the incident response team. Which actions should be taken at this step in the incident response workflow?

Options:

A.

Classify the criticality of the information, research the attacker’s motives, and identify missing patches

B.

Determine the damage to the business, extract reports, and save evidence according to a chain of custody

C.

Classify the attack vector, understand the scope of the event, and identify the vulnerabilities being exploited

D.

Determine the attack surface, evaluate the risks involved, and communicate the incident according to the escalation plan

Buy Now
Questions 20

An organization had several cyberattacks over the last 6 months and has tasked an engineer with looking for patterns or trends that will help the organization anticipate future attacks and mitigate them. Which data analytic technique should the engineer use to accomplish this task?

Options:

A.

diagnostic

B.

qualitative

C.

predictive

D.

statistical

Buy Now
Questions 21

Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)

Options:

A.

Evaluate the intrusion detection system alerts to determine the threat source and attack surface.

B.

Communicate with employees to determine who opened the link and isolate the affected assets.

C.

Examine the firewall and HIPS configuration to identify the exploited vulnerabilities and apply recommended mitigation.

D.

Review the mail server and proxy logs to identify the impact of a potential breach.

E.

Check the email header to identify the sender and analyze the link in an isolated environment.

Buy Now
Questions 22

Refer to the exhibit.

What is occurring in this packet capture?

Options:

A.

TCP port scan

B.

TCP flood

C.

DNS flood

D.

DNS tunneling

Buy Now
Questions 23

Refer to the exhibit.

Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy. Which method was used to signal ISE to quarantine the endpoints?

Options:

A.

SNMP

B.

syslog

C.

REST API

D.

pxGrid

Buy Now
Questions 24

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine. What should be concluded from this report?

Options:

A.

Threat scores are high, malicious ransomware has been detected, and files have been modified

B.

Threat scores are low, malicious ransomware has been detected, and files have been modified

C.

Threat scores are high, malicious activity is detected, but files have not been modified

D.

Threat scores are low and no malicious file activity is detected

Buy Now
Questions 25

An engineer wants to review the packet overviews of SNORT alerts. When printing the SNORT alerts, all the packet headers are included, and the file is too large to utilize. Which action is needed to correct this problem?

Options:

A.

Modify the alert rule to “output alert_syslog: output log”

B.

Modify the output module rule to “output alert_quick: output filename”

C.

Modify the alert rule to “output alert_syslog: output header”

D.

Modify the output module rule to “output alert_fast: output filename”

Buy Now
Questions 26

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

Options:

A.

domain belongs to a competitor

B.

log in during non-working hours

C.

email forwarding to an external domain

D.

log in from a first-seen country

E.

increased number of sent mails

Buy Now
Questions 27

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

Options:

A.

x-frame-options

B.

x-xss-protection

C.

x-content-type-options

D.

x-test-debug

Buy Now