Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Performing CyberOps Using Core Security Technologies (CBRCOR)

Last Update 16 hours ago Total Questions : 139

The Performing CyberOps Using Core Security Technologies (CBRCOR) content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include 350-201 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 350-201 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 350-201 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Performing CyberOps Using Core Security Technologies (CBRCOR) practice test comfortably within the allotted time.

Question # 11

The SIEM tool informs a SOC team of a suspicious file. The team initializes the analysis with an automated sandbox tool, sets up a controlled laboratory to examine the malware specimen, and proceeds with behavioral analysis. What is the next step in the malware analysis process?

A.

Perform static and dynamic code analysis of the specimen.

B.

Unpack the specimen and perform memory forensics.

C.

Contain the subnet in which the suspicious file was found.

D.

Document findings and clean-up the laboratory.

Question # 12

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

A.

Run the program through a debugger to see the sequential actions

B.

Unpack the file in a sandbox to see how it reacts

C.

Research the malware online to see if there are noted findings

D.

Disassemble the malware to understand how it was constructed

Question # 13

Refer to the exhibit.

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

A.

An attacker can initiate a DoS attack.

B.

An attacker can read or change data.

C.

An attacker can transfer data to an external server.

D.

An attacker can modify the access logs.

Question # 14

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

A.

Disable BIND forwarding from the DNS server to avoid reconnaissance.

B.

Disable affected assets and isolate them for further investigation.

C.

Configure affected devices to disable NETRJS protocol.

D.

Configure affected devices to disable the Finger service.

Question # 15

An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?

A.

chmod +x ex.sh

B.

source ex.sh

C.

chroot ex.sh

D.

sh ex.sh

Question # 16

A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices. Which technical architecture must be used?

A.

DLP for data in motion

B.

DLP for removable data

C.

DLP for data in use

D.

DLP for data at rest

Question # 17

Drag and drop the actions below the image onto the boxes in the image for the actions that should be taken during this playbook step. Not all options are used.

Question # 18

A patient views information that is not theirs when they sign in to the hospital’s online portal. The patient calls the support center at the hospital but continues to be put on hold because other patients are experiencing the same issue. An incident has been declared, and an engineer is now on the incident bridge as the CyberOps Tier 3 Analyst. There is a concern about the disclosure of PII occurring in real-time. What is the first step the analyst should take to address this incident?

A.

Evaluate visibility tools to determine if external access resulted in tampering

B.

Contact the third-party handling provider to respond to the incident as critical

C.

Turn off all access to the patient portal to secure patient records

D.

Review system and application logs to identify errors in the portal code

Question # 19

An engineer returned to work and realized that payments that were received over the weekend were sent to the wrong recipient. The engineer discovered that the SaaS tool that processes these payments was down over the weekend. Which step should the engineer take first?

A.

Utilize the SaaS tool team to gather more information on the potential breach

B.

Contact the incident response team to inform them of a potential breach

C.

Organize a meeting to discuss the services that may be affected

D.

Request that the purchasing department creates and sends the payments manually

Question # 20

Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

Go to page: