Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

350-201 Exam Dumps - Cisco CyberOps Professional Questions and Answers

Question # 24

Refer to the exhibit.

A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

Options:

A.

packet sniffer

B.

malware analysis

C.

SIEM

D.

firewall manager

Buy Now
Question # 25

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?

Options:

A.

Disable memory limit.

B.

Disable CPU threshold trap toward the SNMP server.

C.

Enable memory tracing notifications.

D.

Enable memory threshold notifications.

Buy Now
Question # 26

An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default

administrator account login. Which step should an engineer take after receiving this alert?

Options:

A.

Initiate a triage meeting to acknowledge the vulnerability and its potential impact

B.

Determine company usage of the affected products

C.

Search for a patch to install from the vendor

D.

Implement restrictions within the VoIP VLANS

Buy Now
Question # 27

What is a limitation of cyber security risk insurance?

Options:

A.

It does not cover the costs to restore stolen identities as a result of a cyber attack

B.

It does not cover the costs to hire forensics experts to analyze the cyber attack

C.

It does not cover the costs of damage done by third parties as a result of a cyber attack

D.

It does not cover the costs to hire a public relations company to help deal with a cyber attack

Buy Now
Question # 28

What is a benefit of key risk indicators?

Options:

A.

clear perspective into the risk position of an organization

B.

improved visibility on quantifiable information

C.

improved mitigation techniques for unknown threats

D.

clear procedures and processes for organizational risk

Buy Now
Question # 29

What is needed to assess risk mitigation effectiveness in an organization?

Options:

A.

analysis of key performance indicators

B.

compliance with security standards

C.

cost-effectiveness of control measures

D.

updated list of vulnerable systems

Buy Now
Question # 30

An engineer received multiple reports from users trying to access a company website and instead of landing on the website, they are redirected to a malicious website that asks them to fill in sensitive personal data. Which type of attack is occurring?

Options:

A.

Address Resolution Protocol poisoning

B.

session hijacking attack

C.

teardrop attack

D.

Domain Name System poisoning

Buy Now
Question # 31

Refer to the exhibit.

An engineer received multiple reports from employees unable to log into systems with the error: The Group Policy Client service failed to logon – Access is denied. Through further analysis, the engineer discovered several unexpected modifications to system settings. Which type of breach is occurring?

Options:

A.

malware break

B.

data theft

C.

elevation of privileges

D.

denial-of-service

Buy Now
Question # 32

Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

Options:

Buy Now
Question # 33

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

Options:

A.

Analyze environmental threats and causes

B.

Inform the product security incident response team to investigate further

C.

Analyze the precursors and indicators

D.

Inform the computer security incident response team to investigate further

Buy Now
Exam Code: 350-201
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Feb 22, 2025
Questions: 139
350-201 pdf

350-201 PDF

$28.5  $94.99
350-201 Engine

350-201 Testing Engine

$33  $109.99
350-201 PDF + Engine

350-201 PDF + Testing Engine

$43.5  $144.99