Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

350-201 Sample Questions Answers

Questions 4

An engineer received multiple reports from users trying to access a company website and instead of landing on the website, they are redirected to a malicious website that asks them to fill in sensitive personal data. Which type of attack is occurring?

Options:

A.

Address Resolution Protocol poisoning

B.

session hijacking attack

C.

teardrop attack

D.

Domain Name System poisoning

Buy Now
Questions 5

Refer to the exhibit.

How are tokens authenticated when the REST API on a device is accessed from a REST API client?

Options:

A.

The token is obtained by providing a password. The REST client requests access to a resource using the access token. The REST API validates the access token and gives access to the resource.

B.

The token is obtained by providing a password. The REST API requests access to a resource using the access token, validates the access token, and gives access to the resource.

C.

The token is obtained before providing a password. The REST API provides resource access, refreshes

tokens, and returns them to the REST client. The REST client requests access to a resource using the access token.

D.

The token is obtained before providing a password. The REST client provides access to a resource using the access token. The REST API encrypts the access token and gives access to the resource.

Buy Now
Questions 6

Which command does an engineer use to set read/write/execute access on a folder for everyone who reaches the resource?

Options:

A.

chmod 666

B.

chmod 774

C.

chmod 775

D.

chmod 777

Buy Now
Questions 7

Refer to the exhibit.

Where does it signify that a page will be stopped from loading when a scripting attack is detected?

Options:

A.

x-frame-options

B.

x-content-type-options

C.

x-xss-protection

D.

x-test-debug

Buy Now
Questions 8

An engineer returned to work and realized that payments that were received over the weekend were sent to the wrong recipient. The engineer discovered that the SaaS tool that processes these payments was down over the weekend. Which step should the engineer take first?

Options:

A.

Utilize the SaaS tool team to gather more information on the potential breach

B.

Contact the incident response team to inform them of a potential breach

C.

Organize a meeting to discuss the services that may be affected

D.

Request that the purchasing department creates and sends the payments manually

Buy Now
Questions 9

Refer to the exhibit.

What is occurring in this packet capture?

Options:

A.

TCP port scan

B.

TCP flood

C.

DNS flood

D.

DNS tunneling

Buy Now
Questions 10

An engineer detects an intrusion event inside an organization’s network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?

Options:

A.

Disconnect the affected server from the network.

B.

Analyze the source.

C.

Access the affected server to confirm compromised files are encrypted.

D.

Determine the attack surface.

Buy Now
Questions 11

Refer to the exhibit.

A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

Options:

A.

packet sniffer

B.

malware analysis

C.

SIEM

D.

firewall manager

Buy Now
Questions 12

A patient views information that is not theirs when they sign in to the hospital’s online portal. The patient calls the support center at the hospital but continues to be put on hold because other patients are experiencing the same issue. An incident has been declared, and an engineer is now on the incident bridge as the CyberOps Tier 3 Analyst. There is a concern about the disclosure of PII occurring in real-time. What is the first step the analyst should take to address this incident?

Options:

A.

Evaluate visibility tools to determine if external access resulted in tampering

B.

Contact the third-party handling provider to respond to the incident as critical

C.

Turn off all access to the patient portal to secure patient records

D.

Review system and application logs to identify errors in the portal code

Buy Now
Questions 13

A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks. Which standard must the architect apply?

Options:

A.

IEC62446

B.

IEC62443

C.

IEC62439-3

D.

IEC62439-2

Buy Now
Questions 14

An API developer is improving an application code to prevent DDoS attacks. The solution needs to accommodate instances of a large number of API requests coming for legitimate purposes from trustworthy services. Which solution should be implemented?

Options:

A.

Restrict the number of requests based on a calculation of daily averages. If the limit is exceeded, temporarily block access from the IP address and return a 402 HTTP error code.

B.

Implement REST API Security Essentials solution to automatically mitigate limit exhaustion. If the limit is exceeded, temporarily block access from the service and return a 409 HTTP error code.

C.

Increase a limit of replies in a given interval for each API. If the limit is exceeded, block access from the API key permanently and return a 450 HTTP error code.

D.

Apply a limit to the number of requests in a given time interval for each API. If the rate is exceeded, block access from the API key temporarily and return a 429 HTTP error code.

Buy Now
Questions 15

An analyst received multiple alerts on the SIEM console of users that are navigating to malicious URLs. The analyst needs to automate the task of receiving alerts and processing the data for further investigations. Three variables are available from the SIEM console to include in an automation script: console_ip, api_token, and reference_set_name. What must be added to this script to receive a successful HTTP response?

#!/usr/bin/python import sys import requests

Options:

A.

{1}, {2}

B.

{1}, {3}

C.

console_ip, api_token

D.

console_ip, reference_set_name

Buy Now
Questions 16

Refer to the exhibit.

Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options:

A.

An attacker can initiate a DoS attack.

B.

An attacker can read or change data.

C.

An attacker can transfer data to an external server.

D.

An attacker can modify the access logs.

Buy Now
Questions 17

What is the difference between process orchestration and automation?

Options:

A.

Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.

B.

Orchestration arranges the tasks, while automation arranges processes.

C.

Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.

D.

Automation optimizes the individual tasks to execute the process, while orchestration optimizes frequent and repeatable processes.

Buy Now
Questions 18

An organization lost connectivity to critical servers, and users cannot access business applications and internal websites. An engineer checks the network devices to investigate the outage and determines that all devices are functioning. Drag and drop the steps from the left into the sequence on the right to continue investigating this issue. Not all options are used.

Options:

Buy Now
Questions 19

An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?

Options:

A.

HIPAA

B.

FISMA

C.

COBIT

D.

PCI DSS

Buy Now
Questions 20

Refer to the exhibit.

Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

Options:

A.

Create an ACL on the firewall to allow only TLS 1.3

B.

Implement a proxy server in the DMZ network

C.

Create an ACL on the firewall to allow only external connections

D.

Move the webserver to the internal network

Buy Now
Exam Code: 350-201
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
Last Update: Apr 17, 2024
Questions: 139
$76.5  $169.99
$58.5  $129.99
$49.5  $109.99
buy now 350-201