Exam Logo

Cisco (350-201-CBRCOR) Exam Questions And Answers page 14


Refer to the exhibit. Where are the browser page rendering permissions displayed?
Security Concepts Network Security
An analyst received multiple alerts on the SIEM console of users that are navigating to malicious URLs. The analyst needs to automate the task of receiving alerts and processing the data for further investigations. Three variables are available from the SIEM console to include in an automation script: console_ip, api_token, and reference_set_name. What must be added to this script to receive a successful HTTP response?

#!/usr/bin/python
import sys
import requests
Security Concepts Network Security

Refer to the exhibit. Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?
Endpoint Security Threat Intelligence and Incident Response
A SOC analyst is notified by the network monitoring tool that there are unusual types of internal traffic on IP subnet 103.921.2239.0/24. The analyst discovers unexplained encrypted data files on a computer system that belongs on that specific subnet. What is the cause of the issue?
Network Security Endpoint Security

Refer to the exhibit. Where does it signify that a page will be stopped from loading when a scripting attack is detected?
Security Concepts Endpoint Security

Refer to the exhibit. An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?
Security Concepts Endpoint Security
Drag and drop the actions below the image onto the boxes in the image for the actions that should be taken during this playbook step. Not all options are used.

Security Concepts Network Security
An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?
Security Concepts Network Security

Refer to the exhibit. How are tokens authenticated when the REST API on a device is accessed from a REST API client?
Security Concepts Network Security
Refer to the exhibit. A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

Security Concepts Network Security