Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

350-201 Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Questions 4

Drag and drop the telemetry-related considerations from the left onto their cloud service models on the right.

Options:

Buy Now
Questions 5

Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)

Options:

A.

Evaluate the intrusion detection system alerts to determine the threat source and attack surface.

B.

Communicate with employees to determine who opened the link and isolate the affected assets.

C.

Examine the firewall and HIPS configuration to identify the exploited vulnerabilities and apply recommended mitigation.

D.

Review the mail server and proxy logs to identify the impact of a potential breach.

E.

Check the email header to identify the sender and analyze the link in an isolated environment.

Buy Now
Questions 6

Refer to the exhibit.

How are tokens authenticated when the REST API on a device is accessed from a REST API client?

Options:

A.

The token is obtained by providing a password. The REST client requests access to a resource using the access token. The REST API validates the access token and gives access to the resource.

B.

The token is obtained by providing a password. The REST API requests access to a resource using the access token, validates the access token, and gives access to the resource.

C.

The token is obtained before providing a password. The REST API provides resource access, refreshes

tokens, and returns them to the REST client. The REST client requests access to a resource using the access token.

D.

The token is obtained before providing a password. The REST client provides access to a resource using the access token. The REST API encrypts the access token and gives access to the resource.

Buy Now
Questions 7

An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?

Options:

A.

aligning access control policies

B.

exfiltration during data transfer

C.

attack using default accounts

D.

data exposure from backups

Buy Now
Questions 8

A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?

Options:

A.

Create a follow-up report based on the incident documentation.

B.

Perform a vulnerability assessment to find existing vulnerabilities.

C.

Eradicate malicious software from the infected machines.

D.

Collect evidence and maintain a chain-of-custody during further analysis.

Buy Now
Questions 9

An engineer is analyzing a possible compromise that happened a week ago when the company? (Choose two.)

Options:

A.

firewall

B.

Wireshark

C.

autopsy

D.

SHA512

E.

IPS

Buy Now
Questions 10

What is the purpose of hardening systems?

Options:

A.

to securely configure machines to limit the attack surface

B.

to create the logic that triggers alerts when anomalies occur

C.

to identify vulnerabilities within an operating system

D.

to analyze attacks to identify threat actors and points of entry

Buy Now
Questions 11

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

Options:

A.

X-Frame-Options

B.

X-XSS-Protection

C.

Content-Type

D.

Cache-Control

Buy Now