IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / 350-201 問題集  / 350-201 問題練習

Cisco 350-201 問題練習

Performing CyberOps Using Core Security Technologies (CBRCOR) 試験

最新更新時間: 2024/04/10,合計100問。

【2024桜まつりキャンペーン】:350-201 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、350-201 問題集を使用してください。

 / 4

Question No : 1
Refer to the exhibit.



An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior .
Which type of compromise is occurring?

正解:

Question No : 2
A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices .
Which technical architecture must be used?

正解:
Explanation:
Reference: https://www.endpointprotector.com/blog/what-is-data-loss-prevention-dlp/

Question No : 3
What is needed to assess risk mitigation effectiveness in an organization?

正解:

Question No : 4
Refer to the exhibit.



Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

正解:

Question No : 5
Refer to the exhibit.



What is the threat in this Wireshark traffic capture?

正解:

Question No : 6
A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads .
Which standard must the company follow to safeguard the resting data?

正解:
Explanation:
Reference: https://www.thesslstore.com/blog/10-data-privacy-and-encryption-laws-every-business-needs-to- know/

Question No : 7
Refer to the exhibit.



Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy .
Which method was used to signal ISE to quarantine the endpoints?

正解:

Question No : 8
Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit .
What are the next two steps the engineers should take in this investigation? (Choose two.)

正解:

Question No : 9
Refer to the exhibit.



Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis .
What should be concluded from this report?

正解:

Question No : 10
An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal .
Which compliance regulations must the audit apply to the company?

正解:
Explanation:
Reference: https://upserve.com/restaurant-insider/restaurant-pos-pci-compliance-checklist/

Question No : 11
A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks .
Which standard must the architect apply?

正解:

Question No : 12
The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host .
What is the next step in the incident response workflow?

正解:

Question No : 13
Refer to the exhibit.



What is occurring in this packet capture?

正解:

Question No : 14
A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?

正解:

Question No : 15
An organization is using a PKI management server and a SOAR platform to manage the certificate lifecycle. The SOAR platform queries a certificate management tool to check all endpoints for SSL certificates that have either expired or are nearing expiration. Engineers are struggling to manage problematic certificates outside of PKI management since deploying certificates and tracking them requires searching server owners manually .
Which action will improve workflow automation?

正解:

 / 4