Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Professional 350-201 Questions and answers with ValidTests

Exam 350-201 All Questions
Exam 350-201 Premium Access

View all detail and faqs for the 350-201 exam

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

Options:

A.

Run the program through a debugger to see the sequential actions

B.

Unpack the file in a sandbox to see how it reacts

C.

Research the malware online to see if there are noted findings

D.

Disassemble the malware to understand how it was constructed

Expert Solution
Questions # 2:

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

Options:

A.

domain belongs to a competitor

B.

log in during non-working hours

C.

email forwarding to an external domain

D.

log in from a first-seen country

E.

increased number of sent mails

Expert Solution
Questions # 3:

Refer to the exhibit.

Question # 3

IDS is producing an increased amount of false positive events about brute force attempts on the organization’s mail server. How should the Snort rule be modified to improve performance?

Options:

A.

Block list of internal IPs from the rule

B.

Change the rule content match to case sensitive

C.

Set the rule to track the source IP

D.

Tune the count and seconds threshold of the rule

Expert Solution
Questions # 4:

Refer to the exhibit.

Question # 4

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options:

A.

An attacker can initiate a DoS attack.

B.

An attacker can read or change data.

C.

An attacker can transfer data to an external server.

D.

An attacker can modify the access logs.

Expert Solution
Questions # 5:

An API developer is improving an application code to prevent DDoS attacks. The solution needs to accommodate instances of a large number of API requests coming for legitimate purposes from trustworthy services. Which solution should be implemented?

Options:

A.

Restrict the number of requests based on a calculation of daily averages. If the limit is exceeded, temporarily block access from the IP address and return a 402 HTTP error code.

B.

Implement REST API Security Essentials solution to automatically mitigate limit exhaustion. If the limit is exceeded, temporarily block access from the service and return a 409 HTTP error code.

C.

Increase a limit of replies in a given interval for each API. If the limit is exceeded, block access from the API key permanently and return a 450 HTTP error code.

D.

Apply a limit to the number of requests in a given time interval for each API. If the rate is exceeded, block access from the API key temporarily and return a 429 HTTP error code.

Expert Solution
Questions # 6:

Refer to the exhibit.

Question # 6

How must these advisories be prioritized for handling?

Options:

A.

The highest priority for handling depends on the type of institution deploying the devices

B.

Vulnerability #2 is the highest priority for every type of institution

C.

Vulnerability #1 and vulnerability #2 have the same priority

D.

Vulnerability #1 is the highest priority for every type of institution

Expert Solution
Questions # 7:

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

Options:

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Expert Solution
Questions # 8:

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Options:

A.

Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.

B.

Identify who installed the application by reviewing the logs and gather a user access log from the HR department.

C.

Verify user credentials on the affected asset, modify passwords, and confirm available patches and updates are installed.

D.

Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.

Expert Solution
Questions # 9:

An analyst wants to upload an infected file containing sensitive information to a hybrid-analysis sandbox. According to the NIST.SP 800-150 guide to cyber threat information sharing, what is the analyst required to do before uploading the file to safeguard privacy?

Options:

A.

Verify hash integrity.

B.

Remove all personally identifiable information.

C.

Ensure the online sandbox is GDPR compliant.

D.

Lock the file to prevent unauthorized access.

Expert Solution
Questions # 10:

What is the difference between process orchestration and automation?

Options:

A.

Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.

B.

Orchestration arranges the tasks, while automation arranges processes.

C.

Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.

D.

Automation optimizes the individual tasks to execute the process, while orchestration optimizes frequent and repeatable processes.

Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions