Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-201 Exam Dumps - Performing CyberOps Using Core Security Technologies (CBRCOR)

Go to page:
Question # 9

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine. What should be concluded from this report?

A.

Threat scores are high, malicious ransomware has been detected, and files have been modified

B.

Threat scores are low, malicious ransomware has been detected, and files have been modified

C.

Threat scores are high, malicious activity is detected, but files have not been modified

D.

Threat scores are low and no malicious file activity is detected

Full Access
Question # 10

What is the purpose of hardening systems?

A.

to securely configure machines to limit the attack surface

B.

to create the logic that triggers alerts when anomalies occur

C.

to identify vulnerabilities within an operating system

D.

to analyze attacks to identify threat actors and points of entry

Full Access
Question # 11

An organization had several cyberattacks over the last 6 months and has tasked an engineer with looking for patterns or trends that will help the organization anticipate future attacks and mitigate them. Which data analytic technique should the engineer use to accomplish this task?

A.

diagnostic

B.

qualitative

C.

predictive

D.

statistical

Full Access
Question # 12

A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks. Which standard must the architect apply?

A.

IEC62446

B.

IEC62443

C.

IEC62439-3

D.

IEC62439-2

Full Access
Question # 13

A threat actor attacked an organization’s Active Directory server from a remote location, and in a thirty-minute timeframe, stole the password for the administrator account and attempted to access 3 company servers. The threat actor successfully accessed the first server that contained sales data, but no files were downloaded. A second server was also accessed that contained marketing information and 11 files were downloaded. When the threat actor accessed the third server that contained corporate financial data, the session was disconnected, and the administrator’s account was disabled. Which activity triggered the behavior analytics tool?

A.

accessing the Active Directory server

B.

accessing the server with financial data

C.

accessing multiple servers

D.

downloading more than 10 files

Full Access
Question # 14

A security incident affected an organization’s critical business services, and the customer-side web API became unresponsive and crashed. An investigation revealed a spike of API call requests and a high number of inactive sessions during the incident. Which two recommendations should the engineers make to prevent similar incidents in the future? (Choose two.)

A.

Configure shorter timeout periods.

B.

Determine API rate-limiting requirements.

C.

Implement API key maintenance.

D.

Automate server-side error reporting for customers.

E.

Decrease simultaneous API responses.

Full Access
Question # 15

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

A.

Identify the business applications running on the assets

B.

Update software to patch third-party software

C.

Validate CSRF by executing exploits within Metasploit

D.

Fix applications according to the risk scores

Full Access
Question # 16

A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices. Which technical architecture must be used?

A.

DLP for data in motion

B.

DLP for removable data

C.

DLP for data in use

D.

DLP for data at rest

Full Access
Go to page: