Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-201 Practice Exam with Questions & Answers | Set: 3

Questions 21

What is a principle of Infrastructure as Code?

Options:
A.

System maintenance is delegated to software systems

B.

Comprehensive initial designs support robust systems

C.

Scripts and manual configurations work together to ensure repeatable routines

D.

System downtime is grouped and scheduled across the infrastructure

Cisco 350-201 Premium Access
Questions 22

What is the difference between process orchestration and automation?

Options:
A.

Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.

B.

Orchestration arranges the tasks, while automation arranges processes.

C.

Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.

D.

Automation optimizes the individual tasks to execute the process, while orchestration optimizes frequent and repeatable processes.

Questions 23

A company’s web server availability was breached by a DDoS attack and was offline for 3 hours because it was not deemed a critical asset in the incident response playbook. Leadership has requested a risk assessment of the asset. An analyst conducted the risk assessment using the threat sources, events, and vulnerabilities. Which additional element is needed to calculate the risk?

Options:
A.

assessment scope

B.

event severity and likelihood

C.

incident response playbook

D.

risk model framework

Questions 24

Where do threat intelligence tools search for data to identify potential malicious IP addresses, domain names, and URLs?

Options:
A.

customer data

B.

internal database

C.

internal cloud

D.

Internet

Questions 25

Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.

350-201 Question 25

Options:
Questions 26

Refer to the exhibit.

350-201 Question 26

An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server. What is the indicator of compromise?

Options:
A.

The malware is performing comprehensive fingerprinting of the host, including a processor, motherboard manufacturer, and connected removable storage.

B.

The malware is a ransomware querying for installed anti-virus products and operating systems to encrypt and render unreadable until payment is made for file decryption.

C.

The malware has moved to harvesting cookies and stored account information from major browsers and configuring a reverse proxy for intercepting network activity.

D.

The malware contains an encryption and decryption routine to hide URLs/IP addresses and is storing the output of loggers and webcam captures in locally encrypted files for retrieval.

Questions 27

A threat actor attacked an organization’s Active Directory server from a remote location, and in a thirty-minute timeframe, stole the password for the administrator account and attempted to access 3 company servers. The threat actor successfully accessed the first server that contained sales data, but no files were downloaded. A second server was also accessed that contained marketing information and 11 files were downloaded. When the threat actor accessed the third server that contained corporate financial data, the session was disconnected, and the administrator’s account was disabled. Which activity triggered the behavior analytics tool?

Options:
A.

accessing the Active Directory server

B.

accessing the server with financial data

C.

accessing multiple servers

D.

downloading more than 10 files

Questions 28

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company’s infrastructure. Which steps should an engineer take at the recovery stage?

Options:
A.

Determine the systems involved and deploy available patches

B.

Analyze event logs and restrict network access

C.

Review access lists and require users to increase password complexity

D.

Identify the attack vector and update the IDS signature list

Questions 29

An engineer is going through vulnerability triage with company management because of a recent malware outbreak from which 21 affected assets need to be patched or remediated. Management decides not to prioritize fixing the assets and accepts the vulnerabilities. What is the next step the engineer should take?

Options:
A.

Investigate the vulnerability to prevent further spread

B.

Acknowledge the vulnerabilities and document the risk

C.

Apply vendor patches or available hot fixes

D.

Isolate the assets affected in a separate network

Questions 30

A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?

Options:
A.

IaaS

B.

PaaS

C.

DaaS

D.

SaaS

Exam Code: 350-201
Certification Provider: Cisco
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Jul 12, 2025
Questions: 139