Pass the Cisco CyberOps Professional 350-201 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

An organization lost connectivity to critical servers, and users cannot access business applications and internal websites. An engineer checks the network devices to investigate the outage and determines that all devices are functioning. Drag and drop the steps from the left into the sequence on the right to continue investigating this issue. Not all options are used.

Question # 11


Expert Solution
Questions # 12:

What is a benefit of key risk indicators?

Options:

A.

clear perspective into the risk position of an organization


B.

improved visibility on quantifiable information


C.

improved mitigation techniques for unknown threats


D.

clear procedures and processes for organizational risk


Expert Solution
Questions # 13:

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

Options:

A.

HIPAA


B.

PCI-DSS


C.

Sarbanes-Oxley


D.

GDPR


Expert Solution
Questions # 14:

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

Options:

A.

domain belongs to a competitor


B.

log in during non-working hours


C.

email forwarding to an external domain


D.

log in from a first-seen country


E.

increased number of sent mails


Expert Solution
Questions # 15:

A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server. Which security solution is needed at this stage to mitigate the attack?

Options:

A.

web security solution


B.

email security solution


C.

endpoint security solution


D.

network security solution


Expert Solution
Questions # 16:

Refer to the exhibit.

Question # 16

An engineer received multiple reports from employees unable to log into systems with the error: The Group Policy Client service failed to logon – Access is denied. Through further analysis, the engineer discovered several unexpected modifications to system settings. Which type of breach is occurring?

Options:

A.

malware break


B.

data theft


C.

elevation of privileges


D.

denial-of-service


Expert Solution
Questions # 17:

A SOC engineer discovers that the organization had three DDOS attacks overnight. Four servers are reported offline, even though the hardware seems to be working as expected. One of the offline servers is affecting the pay system reporting times. Three employees, including executive management, have reported ransomware on their laptops. Which steps help the engineer understand a comprehensive overview of the incident?

Options:

A.

Run and evaluate a full packet capture on the workloads, review SIEM logs, and define a root cause.


B.

Run and evaluate a full packet capture on the workloads, review SIEM logs, and plan mitigation steps.


C.

Check SOAR to learn what the security systems are reporting about the overnight events, research the attacks, and plan mitigation step.


D.

Check SOAR to know what the security systems are reporting about the overnight events, review the threat vectors, and define a root cause.


Expert Solution
Questions # 18:

Refer to the exhibit.

Question # 18

An employee is a victim of a social engineering phone call and installs remote access software to allow an “MS Support” technician to check his machine for malware. The employee becomes suspicious after the remote technician requests payment in the form of gift cards. The employee has copies of multiple, unencrypted database files, over 400 MB each, on his system and is worried that the scammer copied the files off but has no proof of it. The remote technician was connected sometime between 2:00 pm and 3:00 pm over https. What should be determined regarding data loss between the employee’s laptop and the remote technician’s system?

Options:

A.

No database files were disclosed


B.

The database files were disclosed


C.

The database files integrity was violated


D.

The database files were intentionally corrupted, and encryption is possible


Expert Solution
Questions # 19:

A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?

Options:

A.

Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack


B.

Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities


C.

Review the server backup and identify server content and data criticality to assess the intrusion risk


D.

Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious


Expert Solution
Questions # 20:

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?

Options:

A.

Contain the malware


B.

Install IPS software


C.

Determine the escalation path


D.

Perform vulnerability assessment


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions