Exam Logo

Cisco (350-201-CBRCOR) Exam Questions And Answers page 15


Refer to the exhibit. An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server. What is the indicator of compromise?
Security Concepts Network Security

Refer to the exhibit. Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)
Security Concepts Network Security
Drag and drop the function on the left onto the mechanism on the right.

Network Security Security Operations and Technology
A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?
Network Security Endpoint Security
What is needed to assess risk mitigation effectiveness in an organization?
Security Concepts Threat Intelligence and Incident Response
A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?
Security Concepts Endpoint Security

Refer to the exhibit. The Cisco Secure Network Analytics (Stealthwatch) console alerted with New Malware Server Discovered and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

Network Security Endpoint Security
An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?
Security Concepts Endpoint Security

Refer to the exhibit. How must these advisories be prioritized for handling?
Threat Intelligence and Incident Response Security Operations and Technology
An organization had several cyberattacks over the last 6 months and has tasked an engineer with looking for patterns or trends that will help the organization anticipate future attacks and mitigate them. Which data analytic technique should the engineer use to accomplish this task?
Threat Intelligence and Incident Response Security Operations and Technology