New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-201 Cisco Performing CyberOps Using Core Security Technologies (CBRCOR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 139 questions

Refer to the exhibit.

What is occurring in this packet capture?

A.

TCP port scan

B.

TCP flood

C.

DNS flood

D.

DNS tunneling

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

A.

X-Frame-Options

B.

X-XSS-Protection

C.

Content-Type

D.

Cache-Control

An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?

A.

chmod +x ex.sh

B.

source ex.sh

C.

chroot ex.sh

D.

sh ex.sh

A threat actor attacked an organization’s Active Directory server from a remote location, and in a thirty-minute timeframe, stole the password for the administrator account and attempted to access 3 company servers. The threat actor successfully accessed the first server that contained sales data, but no files were downloaded. A second server was also accessed that contained marketing information and 11 files were downloaded. When the threat actor accessed the third server that contained corporate financial data, the session was disconnected, and the administrator’s account was disabled. Which activity triggered the behavior analytics tool?

A.

accessing the Active Directory server

B.

accessing the server with financial data

C.

accessing multiple servers

D.

downloading more than 10 files

What is a benefit of key risk indicators?

A.

clear perspective into the risk position of an organization

B.

improved visibility on quantifiable information

C.

improved mitigation techniques for unknown threats

D.

clear procedures and processes for organizational risk

An organization is using a PKI management server and a SOAR platform to manage the certificate lifecycle. The SOAR platform queries a certificate management tool to check all endpoints for SSL certificates that have either expired or are nearing expiration. Engineers are struggling to manage problematic certificates outside of PKI management since deploying certificates and tracking them requires searching server owners manually. Which action will improve workflow automation?

A.

Implement a new workflow within SOAR to create tickets in the incident response system, assign problematic certificate update requests to server owners, and register change requests.

B.

Integrate a PKI solution within SOAR to create certificates within the SOAR engines to track, update, and monitor problematic certificates.

C.

Implement a new workflow for SOAR to fetch a report of assets that are outside of the PKI zone, sort assets by certification management leads and automate alerts that updates are needed.

D.

Integrate a SOAR solution with Active Directory to pull server owner details from the AD and send an automated email for problematic certificates requesting updates.

Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

A.

Analyze environmental threats and causes

B.

Inform the product security incident response team to investigate further

C.

Analyze the precursors and indicators

D.

Inform the computer security incident response team to investigate further

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

A.

HIPAA

B.

PCI-DSS

C.

Sarbanes-Oxley

D.

GDPR

Refer to the exhibit.

Based on the detected vulnerabilities, what is the next recommended mitigation step?

A.

Evaluate service disruption and associated risk before prioritizing patches.

B.

Perform root cause analysis for all detected vulnerabilities.

C.

Remediate all vulnerabilities with descending CVSS score order.

D.

Temporarily shut down unnecessary services until patch deployment ends.

An engineer is analyzing a possible compromise that happened a week ago when the company? (Choose two.)

A.

firewall

B.

Wireshark

C.

autopsy

D.

SHA512

E.

IPS

Refer to the exhibit.

How must these advisories be prioritized for handling?

A.

The highest priority for handling depends on the type of institution deploying the devices

B.

Vulnerability #2 is the highest priority for every type of institution

C.

Vulnerability #1 and vulnerability #2 have the same priority

D.

Vulnerability #1 is the highest priority for every type of institution

Refer to the exhibit.

Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

A.

Create an ACL on the firewall to allow only TLS 1.3

B.

Implement a proxy server in the DMZ network

C.

Create an ACL on the firewall to allow only external connections

D.

Move the webserver to the internal network

A company’s web server availability was breached by a DDoS attack and was offline for 3 hours because it was not deemed a critical asset in the incident response playbook. Leadership has requested a risk assessment of the asset. An analyst conducted the risk assessment using the threat sources, events, and vulnerabilities. Which additional element is needed to calculate the risk?

A.

assessment scope

B.

event severity and likelihood

C.

incident response playbook

D.

risk model framework

An API developer is improving an application code to prevent DDoS attacks. The solution needs to accommodate instances of a large number of API requests coming for legitimate purposes from trustworthy services. Which solution should be implemented?

A.

Restrict the number of requests based on a calculation of daily averages. If the limit is exceeded, temporarily block access from the IP address and return a 402 HTTP error code.

B.

Implement REST API Security Essentials solution to automatically mitigate limit exhaustion. If the limit is exceeded, temporarily block access from the service and return a 409 HTTP error code.

C.

Increase a limit of replies in a given interval for each API. If the limit is exceeded, block access from the API key permanently and return a 450 HTTP error code.

D.

Apply a limit to the number of requests in a given time interval for each API. If the rate is exceeded, block access from the API key temporarily and return a 429 HTTP error code.

An engineer detects an intrusion event inside an organization’s network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?

A.

Disconnect the affected server from the network.

B.

Analyze the source.

C.

Access the affected server to confirm compromised files are encrypted.

D.

Determine the attack surface.

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.

Refer to the exhibit.

For IP 192.168.1.209, what are the risk level, activity, and next step?

A.

high risk level, anomalous periodic communication, quarantine with antivirus

B.

critical risk level, malicious server IP, run in a sandboxed environment

C.

critical risk level, data exfiltration, isolate the device

D.

high risk level, malicious host, investigate further

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

A.

Disable BIND forwarding from the DNS server to avoid reconnaissance.

B.

Disable affected assets and isolate them for further investigation.

C.

Configure affected devices to disable NETRJS protocol.

D.

Configure affected devices to disable the Finger service.

Page: 2 / 3
Total 139 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved