Pass the Cisco CyberOps Professional 350-201 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is the difference between process orchestration and automation?

Options:

A.

Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.


B.

Orchestration arranges the tasks, while automation arranges processes.


C.

Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.


D.

Automation optimizes the individual tasks to execute the process, while orchestration optimizes frequent and repeatable processes.


Expert Solution
Questions # 22:

An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?

Options:

A.

Move the IPS to after the firewall facing the internal network


B.

Move the IPS to before the firewall facing the outside network


C.

Configure the proxy service on the IPS


D.

Configure reverse port forwarding on the IPS


Expert Solution
Questions # 23:

A company launched an e-commerce website with multiple points of sale through internal and external e- stores. Customers access the stores from the public website, and employees access the stores from the intranet with an SSO. Which action is needed to comply with PCI standards for hardening the systems?

Options:

A.

Mask PAN numbers


B.

Encrypt personal data


C.

Encrypt access


D.

Mask sales details


Expert Solution
Questions # 24:

An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their accounts blocked, or credentials reset because of unexpected login times and incorrectly

typed credentials. How should the workflow be improved to resolve these issues?

Options:

A.

Meet with privileged users to increase awareness and modify the rules for threat tags and anomalous behavior alerts


B.

Change the SOAR configuration flow to remove the automatic remediation that is increasing the false positives and triggering threats


C.

Add a confirmation step through which SOAR informs the affected user and asks them to confirm whether they made the attempts


D.

Increase incorrect login tries and tune anomalous user behavior not to affect privileged accounts


Expert Solution
Questions # 25:

Refer to the exhibit.

Question # 25

At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

Options:

A.

exploitation


B.

actions on objectives


C.

delivery


D.

reconnaissance


Expert Solution
Questions # 26:

An API developer is improving an application code to prevent DDoS attacks. The solution needs to accommodate instances of a large number of API requests coming for legitimate purposes from trustworthy services. Which solution should be implemented?

Options:

A.

Restrict the number of requests based on a calculation of daily averages. If the limit is exceeded, temporarily block access from the IP address and return a 402 HTTP error code.


B.

Implement REST API Security Essentials solution to automatically mitigate limit exhaustion. If the limit is exceeded, temporarily block access from the service and return a 409 HTTP error code.


C.

Increase a limit of replies in a given interval for each API. If the limit is exceeded, block access from the API key permanently and return a 450 HTTP error code.


D.

Apply a limit to the number of requests in a given time interval for each API. If the rate is exceeded, block access from the API key temporarily and return a 429 HTTP error code.


Expert Solution
Questions # 27:

Refer to the exhibit.

Question # 27

How are tokens authenticated when the REST API on a device is accessed from a REST API client?

Options:

A.

The token is obtained by providing a password. The REST client requests access to a resource using the access token. The REST API validates the access token and gives access to the resource.


B.

The token is obtained by providing a password. The REST API requests access to a resource using the access token, validates the access token, and gives access to the resource.


C.

The token is obtained before providing a password. The REST API provides resource access, refreshes

tokens, and returns them to the REST client. The REST client requests access to a resource using the access token.


D.

The token is obtained before providing a password. The REST client provides access to a resource using the access token. The REST API encrypts the access token and gives access to the resource.


Expert Solution
Questions # 28:

What is idempotence?

Options:

A.

the assurance of system uniformity throughout the whole delivery process


B.

the ability to recover from failures while keeping critical services running


C.

the necessity of setting maintenance of individual deployment environments


D.

the ability to set the target environment configuration regardless of the starting state


Expert Solution
Questions # 29:

Refer to the exhibit.

Question # 29

The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

Question # 29


Expert Solution
Questions # 30:

What is a principle of Infrastructure as Code?

Options:

A.

System maintenance is delegated to software systems


B.

Comprehensive initial designs support robust systems


C.

Scripts and manual configurations work together to ensure repeatable routines


D.

System downtime is grouped and scheduled across the infrastructure


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions