Exam Logo

Cisco (350-201-CBRCOR) Exam Questions And Answers page 11

What is idempotence?
Security Concepts

Refer to the exhibit. An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?
Network Security Security Operations and Technology
An engineer detects an intrusion event inside an organization s network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?
Network Security Threat Intelligence and Incident Response
What is a limitation of cyber security risk insurance?
Security Concepts Threat Intelligence and Incident Response
A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks. Which standard must the architect apply?
Security Concepts Network Security

Refer to the exhibit. Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine. What should be concluded from this report?
Endpoint Security Threat Intelligence and Incident Response
The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?
Network Security Threat Intelligence and Incident Response
A Mac laptop user notices that several files have disappeared from their laptop documents folder. While looking for the files, the user notices that the browser history was recently cleared. The user raises a case, and an analyst reviews the network usage and discovers that it is abnormally high. Which step should be taken to continue the investigation?
Security Concepts Network Security

Refer to the exhibit. An engineer must tune the Cisco IOS device to mitigate an attack that is broadcasting a large number of ICMP packets. The attack is sending the victim s spoofed source IP to a network using an IP broadcast address that causes devices in the network to respond back to the source IP address. Which action does the engineer recommend?
Network Security Threat Intelligence and Incident Response

Refer to the exhibit. What results from this script?
Security Concepts Endpoint Security