Test Online Free Cisco 350-201 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 350-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server.
Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.
Answer:
Question 17Selectable Answer
What is the difference between process orchestration and automation?
Answer:
Question 18Written Answer
DRAG DROP
Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.
Answer:
Question 19Selectable Answer
An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their accounts blocked, or credentials reset because of unexpected login times and incorrectly typed credentials .
How should the workflow be improved to resolve these issues?
Answer:
Question 20Selectable Answer
1.Which bash command will print all lines from the “colors.txt” file containing the non case-sensitive pattern “Yellow”?
Answer:
Question 21Selectable Answer
A SOC analyst is notified by the network monitoring tool that there are unusual types of internal traffic on IP subnet 103.861.2117.0/24. The analyst discovers unexplained encrypted data files on a computer system that belongs on that specific subnet .
What is the cause of the issue?
Answer:
Question 22Written Answer
DRAG DROP
Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.
Answer:
Question 23Selectable Answer
An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction .
Which action should the engineer take to prevent this issue from reoccurring?
Answer:
Question 24Written Answer
DRAG DROP
Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.
Answer:
Question 25Selectable Answer
Refer to the exhibit.
An engineer must tune the Cisco IOS device to mitigate an attack that is broadcasting a large number of ICMP packets. The attack is sending the victim’s spoofed source IP to a network using an IP broadcast address that causes devices in the network to respond back to the source IP address .
Which action does the engineer recommend?
A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days.
Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?
Answer:
Question 27Selectable Answer
What is needed to assess risk mitigation effectiveness in an organization?