Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Performing CyberOps Using Core Security Technologies (CBRCOR)

Last Update 15 hours ago Total Questions : 139

The Performing CyberOps Using Core Security Technologies (CBRCOR) content is now fully updated, with all current exam questions added 15 hours ago. Deciding to include 350-201 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 350-201 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 350-201 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Performing CyberOps Using Core Security Technologies (CBRCOR) practice test comfortably within the allotted time.

Question # 4

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

A.

Identify the business applications running on the assets

B.

Update software to patch third-party software

C.

Validate CSRF by executing exploits within Metasploit

D.

Fix applications according to the risk scores

Question # 5

A customer is using a central device to manage network devices over SNMPv2. A remote attacker caused a denial of service condition and can trigger this vulnerability by issuing a GET request for the ciscoFlashMIB OID on an affected device. Which should be disabled to resolve the issue?

A.

SNMPv2

B.

TCP small services

C.

port UDP 161 and 162

D.

UDP small services

Question # 6

Refer to the exhibit.

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?

A.

Use VLANs to segregate zones and the firewall to allow only required services and secured protocols

B.

Deploy a SOAR solution and correlate log alerts from customer zones

C.

Deploy IDS within sensitive areas and continuously update signatures

D.

Use syslog to gather data from multiple sources and detect intrusion logs for timely responses

Question # 7

According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

A.

Perform a vulnerability assessment

B.

Conduct a data protection impact assessment

C.

Conduct penetration testing

D.

Perform awareness testing

Question # 8

The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource. What is the next step?

A.

Conduct a risk assessment of systems and applications

B.

Isolate the infected host from the rest of the subnet

C.

Install malware prevention software on the host

D.

Analyze network traffic on the host’s subnet

Question # 9

A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?

A.

Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack

B.

Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities

C.

Review the server backup and identify server content and data criticality to assess the intrusion risk

D.

Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious

Question # 10

A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the incident response team to block the malicious URLs requested on the firewall. Which action will improve the effectiveness of the process?

A.

Block local to remote HTTP/HTTPS requests on the firewall for users who triggered the rule.

B.

Inform the user by enabling an automated email response when the rule is triggered.

C.

Inform the incident response team by enabling an automated email response when the rule is triggered.

D.

Create an automation script for blocking URLs on the firewall when the rule is triggered.

Go to page: