Test Online Free Cisco 350-201 Exam Questions and Answers

The questions for 350-201 were last updated On Aug.07 2021

Get 350-201 Full Access
 / 2

Question No : 1
Refer to the exhibit.



Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity .
What is the threat model for the SQL database?

Answer:

Question No : 2
According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

Answer:
Explanation:
Reference: https://apdcat.gencat.cat/web/.content/03-documentacio/Reglament_general_de_proteccio_de_dades/documents/DPIA-Guide.pdf

Question No : 3
Refer to the exhibit.



An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network 2 days prior .
Which type of compromise is occurring?

Answer:

Question No : 4
How does Wireshark decrypt TLS network traffic?

Answer:
Explanation:
Reference: https://wiki.wireshark.org/TLS

Question No : 5
An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default administrator account login .
Which step should an engineer take after receiving this alert?

Answer:

Question No : 6
Refer to the exhibit.



Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine .
What should be concluded from this report?

Answer:

Question No : 7
A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets.
According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

Answer:
Explanation:
Reference: https://cloudogre.com/risk-assessment/

Question No : 8
Refer to the exhibit.



An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server .
What is the indicator of compromise?

Answer:

Question No : 9
A SOC engineer discovers that the organization had three DDOS attacks overnight. Four servers are reported offline, even though the hardware seems to be working as expected. One of the offline servers is affecting the pay system reporting times. Three employees, including executive management, have reported ransomware on their laptops .
Which steps help the engineer understand a comprehensive overview of the incident?

Answer:

Question No : 10
A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web .
What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

Answer:

 / 2
  TOP 50 Exam Questions
Exam