Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Questions 4

Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

350-201 Question 4

Options:

Buy Now
Questions 5

An organization had a breach due to a phishing attack. An engineer leads a team through the recovery phase of the incident response process. Which action should be taken during this phase?

Options:

A.

Host a discovery meeting and define configuration and policy updates

B.

Update the IDS/IPS signatures and reimage the affected hosts

C.

Identify the systems that have been affected and tools used to detect the attack

D.

Identify the traffic with data capture using Wireshark and review email filters

Buy Now
Questions 6

Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)

Options:

A.

Evaluate the intrusion detection system alerts to determine the threat source and attack surface.

B.

Communicate with employees to determine who opened the link and isolate the affected assets.

C.

Examine the firewall and HIPS configuration to identify the exploited vulnerabilities and apply recommended mitigation.

D.

Review the mail server and proxy logs to identify the impact of a potential breach.

E.

Check the email header to identify the sender and analyze the link in an isolated environment.

Buy Now
Questions 7

Refer to the exhibit.

350-201 Question 7

A threat actor behind a single computer exploited a cloud-based application by sending multiple concurrent API requests. These requests made the application unresponsive. Which solution protects the application from being overloaded and ensures more equitable application access across the end-user community?

Options:

A.

Limit the number of API calls that a single client is allowed to make

B.

Add restrictions on the edge router on how often a single client can access the API

C.

Reduce the amount of data that can be fetched from the total pool of active clients that call the API

D.

Increase the application cache of the total pool of active clients that call the API

Buy Now
Questions 8

An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?

Options:

A.

chmod +x ex.sh

B.

source ex.sh

C.

chroot ex.sh

D.

sh ex.sh

Buy Now
Questions 9

Refer to the exhibit.

350-201 Question 9

A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

Options:

A.

packet sniffer

B.

malware analysis

C.

SIEM

D.

firewall manager

Buy Now
Questions 10

A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?

Options:

A.

Create a follow-up report based on the incident documentation.

B.

Perform a vulnerability assessment to find existing vulnerabilities.

C.

Eradicate malicious software from the infected machines.

D.

Collect evidence and maintain a chain-of-custody during further analysis.

Buy Now
Questions 11

Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.

350-201 Question 11

Options:

Buy Now
Questions 12

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?

Options:

A.

Contain the malware

B.

Install IPS software

C.

Determine the escalation path

D.

Perform vulnerability assessment

Buy Now
Questions 13

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

Options:

A.

Disable BIND forwarding from the DNS server to avoid reconnaissance.

B.

Disable affected assets and isolate them for further investigation.

C.

Configure affected devices to disable NETRJS protocol.

D.

Configure affected devices to disable the Finger service.

Buy Now
Questions 14

An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their accounts blocked, or credentials reset because of unexpected login times and incorrectly

typed credentials. How should the workflow be improved to resolve these issues?

Options:

A.

Meet with privileged users to increase awareness and modify the rules for threat tags and anomalous behavior alerts

B.

Change the SOAR configuration flow to remove the automatic remediation that is increasing the false positives and triggering threats

C.

Add a confirmation step through which SOAR informs the affected user and asks them to confirm whether they made the attempts

D.

Increase incorrect login tries and tune anomalous user behavior not to affect privileged accounts

Buy Now
Questions 15

An engineer is analyzing a possible compromise that happened a week ago when the company? (Choose two.)

Options:

A.

firewall

B.

Wireshark

C.

autopsy

D.

SHA512

E.

IPS

Buy Now
Questions 16

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

Options:

A.

Identify the business applications running on the assets

B.

Update software to patch third-party software

C.

Validate CSRF by executing exploits within Metasploit

D.

Fix applications according to the risk scores

Buy Now
Questions 17

An analyst received multiple alerts on the SIEM console of users that are navigating to malicious URLs. The analyst needs to automate the task of receiving alerts and processing the data for further investigations. Three variables are available from the SIEM console to include in an automation script: console_ip, api_token, and reference_set_name. What must be added to this script to receive a successful HTTP response?

#!/usr/bin/python import sys import requests

Options:

A.

{1}, {2}

B.

{1}, {3}

C.

console_ip, api_token

D.

console_ip, reference_set_name

Buy Now
Questions 18

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company’s infrastructure. Which steps should an engineer take at the recovery stage?

Options:

A.

Determine the systems involved and deploy available patches

B.

Analyze event logs and restrict network access

C.

Review access lists and require users to increase password complexity

D.

Identify the attack vector and update the IDS signature list

Buy Now
Questions 19

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

Options:

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Buy Now
Questions 20

How is a SIEM tool used?

Options:

A.

To collect security data from authentication failures and cyber attacks and forward it for analysis

B.

To search and compare security data against acceptance standards and generate reports for analysis

C.

To compare security alerts against configured scenarios and trigger system responses

D.

To collect and analyze security data from network devices and servers and produce alerts

Buy Now
Questions 21

Refer to the exhibit.

350-201 Question 21

An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?

Options:

A.

Top Peers

B.

Top Hosts

C.

Top Conversations

D.

Top Ports

Buy Now
Questions 22

Refer to the exhibit.

350-201 Question 22

Which code snippet will parse the response to identify the status of the domain as malicious, clean or undefined?

350-201 Question 22

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 23

An analyst is alerted for a malicious file hash. After analysis, the analyst determined that an internal workstation is communicating over port 80 with an external server and that the file hash is associated with Duqu malware. Which tactics, techniques, and procedures align with this analysis?

Options:

A.

Command and Control, Application Layer Protocol, Duqu

B.

Discovery, Remote Services: SMB/Windows Admin Shares, Duqu

C.

Lateral Movement, Remote Services: SMB/Windows Admin Shares, Duqu

D.

Discovery, System Network Configuration Discovery, Duqu

Buy Now
Questions 24

What is the purpose of hardening systems?

Options:

A.

to securely configure machines to limit the attack surface

B.

to create the logic that triggers alerts when anomalies occur

C.

to identify vulnerabilities within an operating system

D.

to analyze attacks to identify threat actors and points of entry

Buy Now
Questions 25

Refer to the exhibit.

350-201 Question 25

The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C & C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

350-201 Question 25

Options:

Buy Now
Questions 26

Refer to the exhibit.

350-201 Question 26

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options:

A.

An attacker can initiate a DoS attack.

B.

An attacker can read or change data.

C.

An attacker can transfer data to an external server.

D.

An attacker can modify the access logs.

Buy Now
Questions 27

Refer to the exhibit.

350-201 Question 27

Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

Options:

A.

Create an ACL on the firewall to allow only TLS 1.3

B.

Implement a proxy server in the DMZ network

C.

Create an ACL on the firewall to allow only external connections

D.

Move the webserver to the internal network

Buy Now
Questions 28

An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?

Options:

A.

Move the IPS to after the firewall facing the internal network

B.

Move the IPS to before the firewall facing the outside network

C.

Configure the proxy service on the IPS

D.

Configure reverse port forwarding on the IPS

Buy Now
Questions 29

Refer to the exhibit.

350-201 Question 29

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?

Options:

A.

Use VLANs to segregate zones and the firewall to allow only required services and secured protocols

B.

Deploy a SOAR solution and correlate log alerts from customer zones

C.

Deploy IDS within sensitive areas and continuously update signatures

D.

Use syslog to gather data from multiple sources and detect intrusion logs for timely responses

Buy Now
Questions 30

Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.

350-201 Question 30

Options:

Buy Now
Questions 31

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?

Options:

A.

use of the Nmap tool to identify the vulnerability when the new code was deployed

B.

implementation of a firewall and intrusion detection system

C.

implementation of an endpoint protection system

D.

use of SecDevOps to detect the vulnerability during development

Buy Now
Questions 32

An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default

administrator account login. Which step should an engineer take after receiving this alert?

Options:

A.

Initiate a triage meeting to acknowledge the vulnerability and its potential impact

B.

Determine company usage of the affected products

C.

Search for a patch to install from the vendor

D.

Implement restrictions within the VoIP VLANS

Buy Now
Questions 33

What do 2xx HTTP response codes indicate for REST APIs?

Options:

A.

additional action must be taken by the client to complete the request

B.

the server takes responsibility for error status codes

C.

communication of transfer protocol-level information

D.

successful acceptance of the client’s request

Buy Now
Questions 34

The SIEM tool informs a SOC team of a suspicious file. The team initializes the analysis with an automated sandbox tool, sets up a controlled laboratory to examine the malware specimen, and proceeds with behavioral analysis. What is the next step in the malware analysis process?

Options:

A.

Perform static and dynamic code analysis of the specimen.

B.

Unpack the specimen and perform memory forensics.

C.

Contain the subnet in which the suspicious file was found.

D.

Document findings and clean-up the laboratory.

Buy Now
Questions 35

Refer to the exhibit.

350-201 Question 35

At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

Options:

A.

exploitation

B.

actions on objectives

C.

delivery

D.

reconnaissance

Buy Now
Questions 36

What is a benefit of key risk indicators?

Options:

A.

clear perspective into the risk position of an organization

B.

improved visibility on quantifiable information

C.

improved mitigation techniques for unknown threats

D.

clear procedures and processes for organizational risk

Buy Now
Questions 37

An engineer received an incident ticket of a malware outbreak and used antivirus and malware removal tools to eradicate the threat. The engineer notices that abnormal processes are still occurring in the system and determines that manual intervention is needed to clean the infected host and restore functionality. What is the next step the engineer should take to complete this playbook step?

Options:

A.

Scan the network to identify unknown assets and the asset owners.

B.

Analyze the components of the infected hosts and associated business services.

C.

Scan the host with updated signatures and remove temporary containment.

D.

Analyze the impact of the malware and contain the artifacts.

Buy Now
Questions 38

Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

350-201 Question 38

Options:

Buy Now
Questions 39

An engineer is investigating several cases of increased incoming spam emails and suspicious emails from the HR and service departments. While checking the event sources, the website monitoring tool showed several web scraping alerts overnight. Which type of compromise is indicated?

Options:

A.

phishing

B.

dumpster diving

C.

social engineering

D.

privilege escalation

Buy Now
Questions 40

Refer to the exhibit.

350-201 Question 40

Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy. Which method was used to signal ISE to quarantine the endpoints?

Options:

A.

SNMP

B.

syslog

C.

REST API

D.

pxGrid

Buy Now
Questions 41

An organization is using a PKI management server and a SOAR platform to manage the certificate lifecycle. The SOAR platform queries a certificate management tool to check all endpoints for SSL certificates that have either expired or are nearing expiration. Engineers are struggling to manage problematic certificates outside of PKI management since deploying certificates and tracking them requires searching server owners manually. Which action will improve workflow automation?

Options:

A.

Implement a new workflow within SOAR to create tickets in the incident response system, assign problematic certificate update requests to server owners, and register change requests.

B.

Integrate a PKI solution within SOAR to create certificates within the SOAR engines to track, update, and monitor problematic certificates.

C.

Implement a new workflow for SOAR to fetch a report of assets that are outside of the PKI zone, sort assets by certification management leads and automate alerts that updates are needed.

D.

Integrate a SOAR solution with Active Directory to pull server owner details from the AD and send an automated email for problematic certificates requesting updates.

Buy Now
Exam Code: 350-201
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: May 16, 2026
Questions: 139

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$49.99  $142.83
buy now 350-201 testing engine

PDF (Q&A)

$54.99  $157.11
buy now 350-201 pdf