Exam Logo

Cisco (350-201-CBRCOR) Exam Questions And Answers page 4

Refer to the exhibit. What is the connection status of the ICMP event?

Security Concepts Network Security
A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?
Security Concepts Cloud Security

Refer to the exhibit. What results from this script?
Security Concepts Endpoint Security

Refer to the exhibit. An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server. What is the indicator of compromise?
Security Concepts Network Security
Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)
Security Concepts Network Security
Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

Security Concepts Network Security
Refer to the exhibit. Which asset has the highest risk value?

Security Concepts Cloud Security
Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.

Threat Intelligence and Incident Response Security Operations and Technology
An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?
Endpoint Security

Refer to the exhibit. Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy. Which method was used to signal ISE to quarantine the endpoints?
Network Security Endpoint Security