Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-201 Practice Exam with Questions & Answers

Questions 1

An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?

Options:
A.

HIPAA

B.

FISMA

C.

COBIT

D.

PCI DSS

Cisco 350-201 Premium Access
Questions 2

Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.

350-201 Question 2

Options:
Questions 3

A SIEM tool fires an alert about a VPN connection attempt from an unusual location. The incident response team validates that an attacker has installed a remote access tool on a user’s laptop while traveling. The attacker has the user’s credentials and is attempting to connect to the network.

What is the next step in handling the incident?

Options:
A.

Block the source IP from the firewall

B.

Perform an antivirus scan on the laptop

C.

Identify systems or services at risk

D.

Identify lateral movement

Questions 4

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

Options:
A.

Analyze environmental threats and causes

B.

Inform the product security incident response team to investigate further

C.

Analyze the precursors and indicators

D.

Inform the computer security incident response team to investigate further

Questions 5

An engineer wants to review the packet overviews of SNORT alerts. When printing the SNORT alerts, all the packet headers are included, and the file is too large to utilize. Which action is needed to correct this problem?

Options:
A.

Modify the alert rule to “output alert_syslog: output log”

B.

Modify the output module rule to “output alert_quick: output filename”

C.

Modify the alert rule to “output alert_syslog: output header”

D.

Modify the output module rule to “output alert_fast: output filename”

Questions 6

What is the impact of hardening machine images for deployment?

Options:
A.

reduces the attack surface

B.

increases the speed of patch deployment

C.

reduces the steps needed to mitigate threats

D.

increases the availability of threat alerts

Questions 7

According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

Options:
A.

Perform a vulnerability assessment

B.

Conduct a data protection impact assessment

C.

Conduct penetration testing

D.

Perform awareness testing

Questions 8

An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?

Options:
A.

aligning access control policies

B.

exfiltration during data transfer

C.

attack using default accounts

D.

data exposure from backups

Questions 9

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?

Options:
A.

Disable memory limit.

B.

Disable CPU threshold trap toward the SNMP server.

C.

Enable memory tracing notifications.

D.

Enable memory threshold notifications.

Questions 10

Refer to the exhibit.

350-201 Question 10

How are tokens authenticated when the REST API on a device is accessed from a REST API client?

Options:
A.

The token is obtained by providing a password. The REST client requests access to a resource using the access token. The REST API validates the access token and gives access to the resource.

B.

The token is obtained by providing a password. The REST API requests access to a resource using the access token, validates the access token, and gives access to the resource.

C.

The token is obtained before providing a password. The REST API provides resource access, refreshes

tokens, and returns them to the REST client. The REST client requests access to a resource using the access token.

D.

The token is obtained before providing a password. The REST client provides access to a resource using the access token. The REST API encrypts the access token and gives access to the resource.

Exam Code: 350-201
Certification Provider: Cisco
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Jul 11, 2025
Questions: 139