Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CyberOps Professional 350-201 Book

Page: 9 / 10
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Question 33

Refer to the exhibit.

An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server. What is the indicator of compromise?

Options:

A.

The malware is performing comprehensive fingerprinting of the host, including a processor, motherboard manufacturer, and connected removable storage.

B.

The malware is a ransomware querying for installed anti-virus products and operating systems to encrypt and render unreadable until payment is made for file decryption.

C.

The malware has moved to harvesting cookies and stored account information from major browsers and configuring a reverse proxy for intercepting network activity.

D.

The malware contains an encryption and decryption routine to hide URLs/IP addresses and is storing the output of loggers and webcam captures in locally encrypted files for retrieval.

Question 34

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

Options:

A.

Allow list only authorized hosts to contact the application’s IP at a specific port.

B.

Allow list HTTP traffic through the corporate VLANS.

C.

Allow list traffic to application’s IP from the internal network at a specific port.

D.

Allow list only authorized hosts to contact the application’s VLAN.

Question 35

What is a benefit of key risk indicators?

Options:

A.

clear perspective into the risk position of an organization

B.

improved visibility on quantifiable information

C.

improved mitigation techniques for unknown threats

D.

clear procedures and processes for organizational risk

Question 36

An organization had several cyberattacks over the last 6 months and has tasked an engineer with looking for patterns or trends that will help the organization anticipate future attacks and mitigate them. Which data analytic technique should the engineer use to accomplish this task?

Options:

A.

diagnostic

B.

qualitative

C.

predictive

D.

statistical

Page: 9 / 10
Total 139 questions