Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-201 Exam Dumps - Performing CyberOps Using Core Security Technologies (CBRCOR)

Go to page:
Question # 33

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?

A.

use of the Nmap tool to identify the vulnerability when the new code was deployed

B.

implementation of a firewall and intrusion detection system

C.

implementation of an endpoint protection system

D.

use of SecDevOps to detect the vulnerability during development

Full Access
Question # 34

What is a limitation of cyber security risk insurance?

A.

It does not cover the costs to restore stolen identities as a result of a cyber attack

B.

It does not cover the costs to hire forensics experts to analyze the cyber attack

C.

It does not cover the costs of damage done by third parties as a result of a cyber attack

D.

It does not cover the costs to hire a public relations company to help deal with a cyber attack

Full Access
Question # 35

Refer to the exhibit.

Which command was executed in PowerShell to generate this log?

A.

Get-EventLog -LogName*

B.

Get-EventLog -List

C.

Get-WinEvent -ListLog* -ComputerName localhost

D.

Get-WinEvent -ListLog*

Full Access
Question # 36

Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.

Full Access
Question # 37

A patient views information that is not theirs when they sign in to the hospital’s online portal. The patient calls the support center at the hospital but continues to be put on hold because other patients are experiencing the same issue. An incident has been declared, and an engineer is now on the incident bridge as the CyberOps Tier 3 Analyst. There is a concern about the disclosure of PII occurring in real-time. What is the first step the analyst should take to address this incident?

A.

Evaluate visibility tools to determine if external access resulted in tampering

B.

Contact the third-party handling provider to respond to the incident as critical

C.

Turn off all access to the patient portal to secure patient records

D.

Review system and application logs to identify errors in the portal code

Full Access
Question # 38

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

A.

incident response playbooks

B.

asset vulnerability assessment

C.

report of staff members with asset relations

D.

key assets and executives

E.

malware analysis report

Full Access
Question # 39

An engineer is moving data from NAS servers in different departments to a combined storage database so that the data can be accessed and analyzed by the organization on-demand. Which data management process is being used?

A.

data clustering

B.

data regression

C.

data ingestion

D.

data obfuscation

Full Access
Question # 40

Refer to the exhibit.

An organization is using an internal application for printing documents that requires a separate registration on the website. The application allows format-free user creation, and users must match these required conditions to comply with the company’s user creation policy:

    minimum length: 3

    usernames can only use letters, numbers, dots, and underscores

    usernames cannot begin with a number

The application administrator has to manually change and track these daily to ensure compliance. An engineer is tasked to implement a script to automate the process according to the company user creation policy. The engineer implemented this piece of code within the application, but users are still able to create format-free usernames. Which change is needed to apply the restrictions?

A.

modify code to return error on restrictions def return false_user(username, minlen)

B.

automate the restrictions def automate_user(username, minlen)

C.

validate the restrictions, def validate_user(username, minlen)

D.

modify code to force the restrictions, def force_user(username, minlen)

Full Access
Go to page: