Cisco 350-201

Page:    1 / 28   
Total 140 questions | Updated On: Apr 23, 2024
Question 1

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to
prevent this type of attack from reoccurring? (Choose two.)


Answer: A,D
Question 2

Refer to the exhibit.

1
What is occurring in this packet capture?


Answer: B
Question 3

The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource. What is the next step?


Answer: B
Question 4

Refer to the exhibit.

1
Where are the browser page rendering permissions displayed?


Answer: C
Question 5

Refer to the exhibit.
1
At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?


Answer: C
Page:    1 / 28   
Total 140 questions | Updated On: Apr 23, 2024

Quickly grab our 350-201 product now and kickstart your exam preparation today!

Name: Performing CyberOps Using Cisco Security Technologies
Exam Code: 350-201
Certification: CyberOps Professional
Vendor: Cisco
Total Questions: 140
Last Updated: Apr 23, 2024