New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Last Attempt 350-201 Questions

Page: 9 / 10
Question 36

What is the purpose of hardening systems?

Options:

A.

to securely configure machines to limit the attack surface

B.

to create the logic that triggers alerts when anomalies occur

C.

to identify vulnerabilities within an operating system

D.

to analyze attacks to identify threat actors and points of entry

Question 37

Refer to the exhibit.

Where is the MIME type that should be followed indicated?

Options:

A.

x-test-debug

B.

strict-transport-security

C.

x-xss-protection

D.

x-content-type-options

Question 38

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

Options:

A.

Allow list only authorized hosts to contact the application’s IP at a specific port.

B.

Allow list HTTP traffic through the corporate VLANS.

C.

Allow list traffic to application’s IP from the internal network at a specific port.

D.

Allow list only authorized hosts to contact the application’s VLAN.

Question 39

An engineer notices that unauthorized software was installed on the network and discovers that it was installed by a dormant user account. The engineer suspects an escalation of privilege attack and responds to the incident. Drag and drop the activities from the left into the order for the response on the right.

Options:

Page: 9 / 10
Exam Code: 350-201
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Dec 23, 2024
Questions: 139
350-201 pdf

350-201 PDF

$28.5  $94.99
350-201 Engine

350-201 Testing Engine

$33  $109.99
350-201 PDF + Engine

350-201 PDF + Testing Engine

$43.5  $144.99