Free Demo Questions

Test Online Free Cisco 350-201 Exam Questions and Answers

Practice a live sample before buying full access. This page keeps the free 350-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.

Updated Aug 07, 2021 28 Questions 2 Pages
Page 1 of 2
Next Page
Question 1 Selectable Answer
Refer to the exhibit.



Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity .
What is the threat model for the SQL database?

Answer:
Question 2 Selectable Answer
According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

Answer:
Explanation:
Reference: https://apdcat.gencat.cat/web/.content/03-documentacio/Reglament_general_de_proteccio_de_dades/documents/DPIA-Guide.pdf
Question 3 Selectable Answer
Refer to the exhibit.



An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior .
Which type of compromise is occurring?

Answer:
Question 4 Selectable Answer
How does Wireshark decrypt TLS network traffic?

Answer:
Explanation:
Reference: https://wiki.wireshark.org/TLS
Question 5 Selectable Answer
An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default administrator account login .
Which step should an engineer take after receiving this alert?

Answer:
Question 6 Selectable Answer
Refer to the exhibit.



Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine .
What should be concluded from this report?

Answer:
Question 7 Selectable Answer
A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets.
According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

Answer:
Explanation:
Reference: https://cloudogre.com/risk-assessment/
Question 8 Selectable Answer
Refer to the exhibit.



An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server .
What is the indicator of compromise?

Answer:
Question 9 Selectable Answer
A SOC engineer discovers that the organization had three DDOS attacks overnight. Four servers are reported offline, even though the hardware seems to be working as expected. One of the offline servers is affecting the pay system reporting times. Three employees, including executive management, have reported ransomware on their laptops .
Which steps help the engineer understand a comprehensive overview of the incident?

Answer:
Question 10 Selectable Answer
A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web .
What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

Answer:
Question 11 Written Answer
DRAG DROP
Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.


Answer:

Question 12 Selectable Answer
An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach .
Which indicator generated this IOC event?

Answer:
Question 13 Selectable Answer
A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company’s confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments .
What are the actions a security manager should take?

Answer:
Question 14 Selectable Answer
A payroll administrator noticed unexpected changes within a piece of software and reported the incident to the incident response team .
Which actions should be taken at this step in the incident response workflow?

Answer:
Question 15 Selectable Answer
A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server .
Which security solution is needed at this stage to mitigate the attack?

Answer:
Showing page 1 of 2
Next Page