Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-201 Exam Dumps - Performing CyberOps Using Core Security Technologies (CBRCOR)

Go to page:
Question # 17

An engineer wants to review the packet overviews of SNORT alerts. When printing the SNORT alerts, all the packet headers are included, and the file is too large to utilize. Which action is needed to correct this problem?

A.

Modify the alert rule to “output alert_syslog: output log”

B.

Modify the output module rule to “output alert_quick: output filename”

C.

Modify the alert rule to “output alert_syslog: output header”

D.

Modify the output module rule to “output alert_fast: output filename”

Full Access
Question # 18

Refer to the exhibit.

An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?

A.

a DOS MZ executable format

B.

a MS-DOS executable archive

C.

an archived malware

D.

a Windows executable file

Full Access
Question # 19

What is the impact of hardening machine images for deployment?

A.

reduces the attack surface

B.

increases the speed of patch deployment

C.

reduces the steps needed to mitigate threats

D.

increases the availability of threat alerts

Full Access
Question # 20

Refer to the exhibit.

Cisco Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a Quarantine VLAN using Adaptive Network Control policy. Which telemetry feeds were correlated with SMC to identify the malware?

A.

NetFlow and event data

B.

event data and syslog data

C.

SNMP and syslog data

D.

NetFlow and SNMP

Full Access
Question # 21

Refer to the exhibit.

An engineer is performing static analysis of a file received and reported by a user. Which risk is indicated in this STIX?

A.

The file is redirecting users to a website that requests privilege escalations from the user.

B.

The file is redirecting users to the website that is downloading ransomware to encrypt files.

C.

The file is redirecting users to a website that harvests cookies and stored account information.

D.

The file is redirecting users to a website that is determining users’ geographic location.

Full Access
Question # 22

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

A.

Allow list only authorized hosts to contact the application’s IP at a specific port.

B.

Allow list HTTP traffic through the corporate VLANS.

C.

Allow list traffic to application’s IP from the internal network at a specific port.

D.

Allow list only authorized hosts to contact the application’s VLAN.

Full Access
Question # 23

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

A.

domain belongs to a competitor

B.

log in during non-working hours

C.

email forwarding to an external domain

D.

log in from a first-seen country

E.

increased number of sent mails

Full Access
Question # 24

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?

A.

Contain the malware

B.

Install IPS software

C.

Determine the escalation path

D.

Perform vulnerability assessment

Full Access
Go to page: