Pass the Cisco CyberOps Professional 350-201 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

What is the threat in this Wireshark traffic capture?

Options:

A.

A high rate of SYN packets being sent from multiple sources toward a single destination IP


B.

A flood of ACK packets coming from a single source IP to multiple destination IPs


C.

A high rate of SYN packets being sent from a single source IP toward multiple destination IPs


D.

A flood of SYN packets coming from a single source IP to a single destination IP


Questions # 2:

Refer to the exhibit.

Question # 2

IDS is producing an increased amount of false positive events about brute force attempts on the organization’s mail server. How should the Snort rule be modified to improve performance?

Options:

A.

Block list of internal IPs from the rule


B.

Change the rule content match to case sensitive


C.

Set the rule to track the source IP


D.

Tune the count and seconds threshold of the rule


Questions # 3:

Refer to the exhibit.

Question # 3

An engineer is performing static analysis of a file received and reported by a user. Which risk is indicated in this STIX?

Options:

A.

The file is redirecting users to a website that requests privilege escalations from the user.


B.

The file is redirecting users to the website that is downloading ransomware to encrypt files.


C.

The file is redirecting users to a website that harvests cookies and stored account information.


D.

The file is redirecting users to a website that is determining users’ geographic location.


Questions # 4:

An engineer received multiple reports from users trying to access a company website and instead of landing on the website, they are redirected to a malicious website that asks them to fill in sensitive personal data. Which type of attack is occurring?

Options:

A.

Address Resolution Protocol poisoning


B.

session hijacking attack


C.

teardrop attack


D.

Domain Name System poisoning


Questions # 5:

Refer to the exhibit.

Question # 5

An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?

Options:

A.

a DOS MZ executable format


B.

a MS-DOS executable archive


C.

an archived malware


D.

a Windows executable file


Questions # 6:

A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the incident response team to block the malicious URLs requested on the firewall. Which action will improve the effectiveness of the process?

Options:

A.

Block local to remote HTTP/HTTPS requests on the firewall for users who triggered the rule.


B.

Inform the user by enabling an automated email response when the rule is triggered.


C.

Inform the incident response team by enabling an automated email response when the rule is triggered.


D.

Create an automation script for blocking URLs on the firewall when the rule is triggered.


Questions # 7:

A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?

Options:

A.

IaaS


B.

PaaS


C.

DaaS


D.

SaaS


Questions # 8:

Refer to the exhibit.

Question # 8

Where does it signify that a page will be stopped from loading when a scripting attack is detected?

Options:

A.

x-frame-options


B.

x-content-type-options


C.

x-xss-protection


D.

x-test-debug