Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-201 Exam Dumps - Performing CyberOps Using Core Security Technologies (CBRCOR)

Question # 4

Refer to the exhibit.

An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server. What is the indicator of compromise?

A.

The malware is performing comprehensive fingerprinting of the host, including a processor, motherboard manufacturer, and connected removable storage.

B.

The malware is a ransomware querying for installed anti-virus products and operating systems to encrypt and render unreadable until payment is made for file decryption.

C.

The malware has moved to harvesting cookies and stored account information from major browsers and configuring a reverse proxy for intercepting network activity.

D.

The malware contains an encryption and decryption routine to hide URLs/IP addresses and is storing the output of loggers and webcam captures in locally encrypted files for retrieval.

Full Access
Question # 5

Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.

Full Access
Question # 6

How does Wireshark decrypt TLS network traffic?

A.

with a key log file using per-session secrets

B.

using an RSA public key

C.

by observing DH key exchange

D.

by defining a user-specified decode-as

Full Access
Question # 7

What is idempotence?

A.

the assurance of system uniformity throughout the whole delivery process

B.

the ability to recover from failures while keeping critical services running

C.

the necessity of setting maintenance of individual deployment environments

D.

the ability to set the target environment configuration regardless of the starting state

Full Access
Question # 8

A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?

A.

Create a rule triggered by 3 failed VPN connection attempts in an 8-hour period

B.

Create a rule triggered by 1 successful VPN connection from any nondestination country

C.

Create a rule triggered by multiple successful VPN connections from the destination countries

D.

Analyze the logs from all countries related to this user during the traveling period

Full Access
Question # 9

Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.

Full Access
Question # 10

An analyst received multiple alerts on the SIEM console of users that are navigating to malicious URLs. The analyst needs to automate the task of receiving alerts and processing the data for further investigations. Three variables are available from the SIEM console to include in an automation script: console_ip, api_token, and reference_set_name. What must be added to this script to receive a successful HTTP response?

#!/usr/bin/python import sys import requests

A.

{1}, {2}

B.

{1}, {3}

C.

console_ip, api_token

D.

console_ip, reference_set_name

Full Access
Question # 11

Refer to the exhibit.

An engineer must tune the Cisco IOS device to mitigate an attack that is broadcasting a large number of ICMP packets. The attack is sending the victim’s spoofed source IP to a network using an IP broadcast address that causes devices in the network to respond back to the source IP address. Which action does the engineer recommend?

A.

Use command ip verify reverse-path interface

B.

Use global configuration command service tcp-keepalives-out

C.

Use subinterface command no ip directed-broadcast

D.

Use logging trap 6

Full Access
Question # 12

An engineer is analyzing a possible compromise that happened a week ago when the company ? (Choose two.)

A.

firewall

B.

Wireshark

C.

autopsy

D.

SHA512

E.

IPS

Full Access
Question # 13

An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?

A.

ExecutedMalware.ioc

B.

Crossrider.ioc

C.

ConnectToSuspiciousDomain.ioc

D.

W32 AccesschkUtility.ioc

Full Access
Question # 14

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Full Access
Question # 15

A Mac laptop user notices that several files have disappeared from their laptop documents folder. While looking for the files, the user notices that the browser history was recently cleared. The user raises a case, and an analyst reviews the network usage and discovers that it is abnormally high. Which step should be taken to continue the investigation?

A.

Run the sudo sysdiagnose command

B.

Run the sh command

C.

Run the w command

D.

Run the who command

Full Access
Question # 16

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

A.

Identify the business applications running on the assets

B.

Update software to patch third-party software

C.

Validate CSRF by executing exploits within Metasploit

D.

Fix applications according to the risk scores

Full Access
Question # 17

What do 2xx HTTP response codes indicate for REST APIs?

A.

additional action must be taken by the client to complete the request

B.

the server takes responsibility for error status codes

C.

communication of transfer protocol-level information

D.

successful acceptance of the client’s request

Full Access
Question # 18

A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The

hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

A.

Run and analyze the DLP Incident Summary Report from the Email Security Appliance

B.

Ask the company to execute the payload for real time analysis

C.

Investigate further in open source repositories using YARA to find matches

D.

Obtain a copy of the file for detonation in a sandbox

Full Access
Question # 19

Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.

Full Access
Question # 20

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

A.

incident response playbooks

B.

asset vulnerability assessment

C.

report of staff members with asset relations

D.

key assets and executives

E.

malware analysis report

Full Access