Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Newly Released Cisco 350-201 Exam PDF

Page: 4 / 10
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Question 13

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

Options:

A.

incident response playbooks

B.

asset vulnerability assessment

C.

report of staff members with asset relations

D.

key assets and executives

E.

malware analysis report

Question 14

A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the incident response team to block the malicious URLs requested on the firewall. Which action will improve the effectiveness of the process?

Options:

A.

Block local to remote HTTP/HTTPS requests on the firewall for users who triggered the rule.

B.

Inform the user by enabling an automated email response when the rule is triggered.

C.

Inform the incident response team by enabling an automated email response when the rule is triggered.

D.

Create an automation script for blocking URLs on the firewall when the rule is triggered.

Question 15

A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company’s confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments. What are the actions a security manager should take?

Options:

A.

Measure confidentiality level of downloaded documents.

B.

Report to the incident response team.

C.

Escalate to contractor’s manager.

D.

Communicate with the contractor to identify the motives.

Question 16

Refer to the exhibit.

An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?

Options:

A.

Top Peers

B.

Top Hosts

C.

Top Conversations

D.

Top Ports

Page: 4 / 10
Total 139 questions