Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-201 Practice Exam with Questions & Answers | Set: 4

Questions 31

An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default

administrator account login. Which step should an engineer take after receiving this alert?

Options:
A.

Initiate a triage meeting to acknowledge the vulnerability and its potential impact

B.

Determine company usage of the affected products

C.

Search for a patch to install from the vendor

D.

Implement restrictions within the VoIP VLANS

Cisco 350-201 Premium Access
Questions 32

An engineer is analyzing a possible compromise that happened a week ago when the company? (Choose two.)

Options:
A.

firewall

B.

Wireshark

C.

autopsy

D.

SHA512

E.

IPS

Questions 33

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to

prevent this type of attack from reoccurring? (Choose two.)

Options:
A.

Implement a patch management process.

B.

Scan the company server files for known viruses.

C.

Apply existing patches to the company servers.

D.

Automate antivirus scans of the company servers.

E.

Define roles and responsibilities in the incident response playbook.

Questions 34

An organization had several cyberattacks over the last 6 months and has tasked an engineer with looking for patterns or trends that will help the organization anticipate future attacks and mitigate them. Which data analytic technique should the engineer use to accomplish this task?

Options:
A.

diagnostic

B.

qualitative

C.

predictive

D.

statistical

Questions 35

After a recent malware incident, the forensic investigator is gathering details to identify the breach and causes. The investigator has isolated the affected workstation. What is the next step that should be taken in this investigation?

Options:
A.

Analyze the applications and services running on the affected workstation.

B.

Compare workstation configuration and asset configuration policy to identify gaps.

C.

Inspect registry entries for recently executed files.

D.

Review audit logs for privilege escalation events.

Questions 36

Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

350-201 Question 36

Options:
Questions 37

Refer to the exhibit.

350-201 Question 37

Which indicator of compromise is represented by this STIX?

Options:
A.

website redirecting traffic to ransomware server

B.

website hosting malware to download files

C.

web server vulnerability exploited by malware

D.

cross-site scripting vulnerability to backdoor server

Questions 38

Refer to the exhibit.

350-201 Question 38

At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

Options:
A.

exploitation

B.

actions on objectives

C.

delivery

D.

reconnaissance

Questions 39

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

Options:
A.

Run the program through a debugger to see the sequential actions

B.

Unpack the file in a sandbox to see how it reacts

C.

Research the malware online to see if there are noted findings

D.

Disassemble the malware to understand how it was constructed

Questions 40

Refer to the exhibit.

350-201 Question 40

How must these advisories be prioritized for handling?

Options:
A.

The highest priority for handling depends on the type of institution deploying the devices

B.

Vulnerability #2 is the highest priority for every type of institution

C.

Vulnerability #1 and vulnerability #2 have the same priority

D.

Vulnerability #1 is the highest priority for every type of institution

Exam Code: 350-201
Certification Provider: Cisco
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Jul 15, 2025
Questions: 139