Test Online Free Cisco 350-201 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 350-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity .
What is the threat model for the SQL database?
Answer:
Question 2Selectable Answer
According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?
An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior .
Which type of compromise is occurring?
An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default administrator account login .
Which step should an engineer take after receiving this alert?
Answer:
Question 6Selectable Answer
Refer to the exhibit.
Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine .
What should be concluded from this report?
Answer:
Question 7Selectable Answer
A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets.
According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)
An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server .
What is the indicator of compromise?
Answer:
Question 9Selectable Answer
A SOC engineer discovers that the organization had three DDOS attacks overnight. Four servers are reported offline, even though the hardware seems to be working as expected. One of the offline servers is affecting the pay system reporting times. Three employees, including executive management, have reported ransomware on their laptops .
Which steps help the engineer understand a comprehensive overview of the incident?
Answer:
Question 10Selectable Answer
A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web .
What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?
Answer:
Question 11Written Answer
DRAG DROP
Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.
Answer:
Question 12Selectable Answer
An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach .
Which indicator generated this IOC event?
Answer:
Question 13Selectable Answer
A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company’s confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments .
What are the actions a security manager should take?
Answer:
Question 14Selectable Answer
A payroll administrator noticed unexpected changes within a piece of software and reported the incident to the incident response team .
Which actions should be taken at this step in the incident response workflow?
Answer:
Question 15Selectable Answer
A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server .
Which security solution is needed at this stage to mitigate the attack?