Free 350-201 Exam Braindumps

Pass your Performing CyberOps Using Core Security Technologies (CBRCOR) exam with these free Questions and Answers

Page 4 of 28
QUESTION 11

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?

  1. A. Contain the malware
  2. B. Install IPS software
  3. C. Determine the escalation path
  4. D. Perform vulnerability assessment

Correct Answer: D

QUESTION 12

Drag and drop the telemetry-related considerations from the left onto their cloud service models on the right.
350-201 dumps exhibit
Solution:
350-201 dumps exhibit

Does this meet the goal?

  1. A. Yes
  2. B. No

Correct Answer: A

QUESTION 13

Refer to the exhibit.
350-201 dumps exhibit
What is occurring in this packet capture?

  1. A. TCP port scan
  2. B. TCP flood
  3. C. DNS flood
  4. D. DNS tunneling

Correct Answer: B

QUESTION 14

Refer to the exhibit.
350-201 dumps exhibit
How are tokens authenticated when the REST API on a device is accessed from a REST API client?

  1. A. The token is obtained by providing a passwor
  2. B. The REST client requests access to a resource using the access toke
  3. C. The REST API validates the access token and gives access to the resource.
  4. D. The token is obtained by providing a passwor
  5. E. The REST API requests access to a resource using the access token, validates the access token, and gives access to the resource.
  6. F. The token is obtained before providing a passwor
  7. G. The REST API provides resource access, refreshes tokens, and returns them to the REST clien
  8. H. The REST client requests access to a resource using theaccess token.
  9. I. The token is obtained before providing a passwor
  10. J. The REST client provides access to a resource using the access toke
  11. K. The REST API encrypts the access token and gives access to the resource.

Correct Answer: D

QUESTION 15

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

  1. A. Run the program through a debugger to see the sequential actions
  2. B. Unpack the file in a sandbox to see how it reacts
  3. C. Research the malware online to see if there are noted findings
  4. D. Disassemble the malware to understand how it was constructed

Correct Answer: C

Page 4 of 28

Post your Comments and Discuss Cisco 350-201 exam with other Community members: