Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

PDF 350-201 Study Guide

Page: 8 / 10
Total 139 questions

Performing CyberOps Using Core Security Technologies (CBRCOR) Questions and Answers

Question 29

Refer to the exhibit.

Which indicator of compromise is represented by this STIX?

Options:

A.

website redirecting traffic to ransomware server

B.

website hosting malware to download files

C.

web server vulnerability exploited by malware

D.

cross-site scripting vulnerability to backdoor server

Question 30

What is the impact of hardening machine images for deployment?

Options:

A.

reduces the attack surface

B.

increases the speed of patch deployment

C.

reduces the steps needed to mitigate threats

D.

increases the availability of threat alerts

Question 31

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

Options:

A.

HIPAA

B.

PCI-DSS

C.

Sarbanes-Oxley

D.

GDPR

Question 32

A company launched an e-commerce website with multiple points of sale through internal and external e- stores. Customers access the stores from the public website, and employees access the stores from the intranet with an SSO. Which action is needed to comply with PCI standards for hardening the systems?

Options:

A.

Mask PAN numbers

B.

Encrypt personal data

C.

Encrypt access

D.

Mask sales details

Page: 8 / 10
Total 139 questions