Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 350-201 Practice Exam with Questions & Answers | Set: 2

Questions 11

What do 2xx HTTP response codes indicate for REST APIs?

Options:
A.

additional action must be taken by the client to complete the request

B.

the server takes responsibility for error status codes

C.

communication of transfer protocol-level information

D.

successful acceptance of the client’s request

Cisco 350-201 Premium Access
Questions 12

Refer to the exhibit.

350-201 Question 12

Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?

Options:
A.

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores do not indicate the likelihood of malicious ransomware.

B.

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores are high and do not indicate the likelihood of malicious ransomware.

C.

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the

scores are high and indicate the likelihood that malicious ransomware has been detected.

D.

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the scores are low and indicate the likelihood that malicious ransomware has been detected.

Questions 13

An engineer notices that unauthorized software was installed on the network and discovers that it was installed by a dormant user account. The engineer suspects an escalation of privilege attack and responds to the incident. Drag and drop the activities from the left into the order for the response on the right.

350-201 Question 13

Options:
Questions 14

Refer to the exhibit.

350-201 Question 14

An engineer must tune the Cisco IOS device to mitigate an attack that is broadcasting a large number of ICMP packets. The attack is sending the victim’s spoofed source IP to a network using an IP broadcast address that causes devices in the network to respond back to the source IP address. Which action does the engineer recommend?

Options:
A.

Use command ip verify reverse-path interface

B.

Use global configuration command service tcp-keepalives-out

C.

Use subinterface command no ip directed-broadcast

D.

Use logging trap 6

Questions 15

A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the incident response team to block the malicious URLs requested on the firewall. Which action will improve the effectiveness of the process?

Options:
A.

Block local to remote HTTP/HTTPS requests on the firewall for users who triggered the rule.

B.

Inform the user by enabling an automated email response when the rule is triggered.

C.

Inform the incident response team by enabling an automated email response when the rule is triggered.

D.

Create an automation script for blocking URLs on the firewall when the rule is triggered.

Questions 16

An organization had a breach due to a phishing attack. An engineer leads a team through the recovery phase of the incident response process. Which action should be taken during this phase?

Options:
A.

Host a discovery meeting and define configuration and policy updates

B.

Update the IDS/IPS signatures and reimage the affected hosts

C.

Identify the systems that have been affected and tools used to detect the attack

D.

Identify the traffic with data capture using Wireshark and review email filters

Questions 17

Refer to the exhibit.

350-201 Question 17

What results from this script?

Options:
A.

Seeds for existing domains are checked

B.

A search is conducted for additional seeds

C.

Domains are compared to seed rules

D.

A list of domains as seeds is blocked

Questions 18

Refer to the exhibit.

350-201 Question 18

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options:
A.

An attacker can initiate a DoS attack.

B.

An attacker can read or change data.

C.

An attacker can transfer data to an external server.

D.

An attacker can modify the access logs.

Questions 19

A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks. Which standard must the architect apply?

Options:
A.

IEC62446

B.

IEC62443

C.

IEC62439-3

D.

IEC62439-2

Questions 20

An engineer is moving data from NAS servers in different departments to a combined storage database so that the data can be accessed and analyzed by the organization on-demand. Which data management process is being used?

Options:
A.

data clustering

B.

data regression

C.

data ingestion

D.

data obfuscation

Exam Code: 350-201
Certification Provider: Cisco
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Sep 13, 2025
Questions: 139