Pass the Cisco CyberOps Professional 350-201 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.

Question # 31


Expert Solution
Questions # 32:

A malware outbreak is detected by the SIEM and is confirmed as a true positive. The incident response team follows the playbook to mitigate the threat. What is the first action for the incident response team?

Options:

A.

Assess the network for unexpected behavior


B.

Isolate critical hosts from the network


C.

Patch detected vulnerabilities from critical hosts


D.

Perform analysis based on the established risk factors


Expert Solution
Questions # 33:

What is the HTTP response code when the REST API information requested by the authenticated user cannot be found?

Options:

A.

401


B.

402


C.

403


D.

404


E.

405


Expert Solution
Questions # 34:

A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices. Which technical architecture must be used?

Options:

A.

DLP for data in motion


B.

DLP for removable data


C.

DLP for data in use


D.

DLP for data at rest


Expert Solution
Questions # 35:

An analyst received multiple alerts on the SIEM console of users that are navigating to malicious URLs. The analyst needs to automate the task of receiving alerts and processing the data for further investigations. Three variables are available from the SIEM console to include in an automation script: console_ip, api_token, and reference_set_name. What must be added to this script to receive a successful HTTP response?

#!/usr/bin/python import sys import requests

Options:

A.

{1}, {2}


B.

{1}, {3}


C.

console_ip, api_token


D.

console_ip, reference_set_name


Expert Solution
Questions # 36:

Refer to the exhibit.

Question # 36

An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?

Options:

A.

Top Peers


B.

Top Hosts


C.

Top Conversations


D.

Top Ports


Expert Solution
Questions # 37:

An engineer detects an intrusion event inside an organization’s network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?

Options:

A.

Disconnect the affected server from the network.


B.

Analyze the source.


C.

Access the affected server to confirm compromised files are encrypted.


D.

Determine the attack surface.


Expert Solution
Questions # 38:

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

Options:

A.

Disable BIND forwarding from the DNS server to avoid reconnaissance.


B.

Disable affected assets and isolate them for further investigation.


C.

Configure affected devices to disable NETRJS protocol.


D.

Configure affected devices to disable the Finger service.


Expert Solution
Questions # 39:

What is needed to assess risk mitigation effectiveness in an organization?

Options:

A.

analysis of key performance indicators


B.

compliance with security standards


C.

cost-effectiveness of control measures


D.

updated list of vulnerable systems


Expert Solution
Questions # 40:

An engineer is investigating several cases of increased incoming spam emails and suspicious emails from the HR and service departments. While checking the event sources, the website monitoring tool showed several web scraping alerts overnight. Which type of compromise is indicated?

Options:

A.

phishing


B.

dumpster diving


C.

social engineering


D.

privilege escalation


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions