Cisco 350-201 - Performing CyberOps Using Core Security Technologies (CBRCOR) Exam
Page: 2 / 28
Total 139 questions
Question #6 (Topic: Single Topic)
The physical security department received a report that an unauthorized person followed an authorized individual to enter a secured premise. The incident was
documented and given to a security specialist to analyze. Which step should be taken at this stage?
documented and given to a security specialist to analyze. Which step should be taken at this stage?
A. Determine the assets to which the attacker has access
B. Identify assets the attacker handled or acquired
C. Change access controls to high risk assets in the enterprise
D. Identify movement of the attacker in the enterprise
Answer: D
Question #7 (Topic: Single Topic)
A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment.
The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)
The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)
A. incident response playbooks
B. asset vulnerability assessment
C. report of staff members with asset relations
D. key assets and executives
E. malware analysis report
Answer: BE
Question #8 (Topic: Single Topic)

Refer to the exhibit. At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?
A. exploitation
B. actions on objectives
C. delivery
D. reconnaissance
Answer: C
Question #9 (Topic: Single Topic)

Refer to the exhibit. How must these advisories be prioritized for handling?
A. The highest priority for handling depends on the type of institution deploying the devices
B. Vulnerability #2 is the highest priority for every type of institution
C. Vulnerability #1 and vulnerability #2 have the same priority
D. Vulnerability #1 is the highest priority for every type of institution
Answer: B
Question #10 (Topic: Single Topic)

Refer to the exhibit. Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)
A. Create an ACL on the firewall to allow only TLS 1.3
B. Implement a reverse server in the DMZ network
C. Create an ACL on the firewall to allow only external connections
D. Move the webserver to the internal network
E. Move the webserver to the external network
Answer: AB