Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Cisco CyberOps Professional 350-201 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 350-201 Premium Access

View all detail and faqs for the 350-201 exam


390 Students Passed

95% Average Score

92% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

For IP 192.168.1.209, what are the risk level, activity, and next step?

Options:

A.

high risk level, anomalous periodic communication, quarantine with antivirus

B.

critical risk level, malicious server IP, run in a sandboxed environment

C.

critical risk level, data exfiltration, isolate the device

D.

high risk level, malicious host, investigate further

Questions # 2:

What do 2xx HTTP response codes indicate for REST APIs?

Options:

A.

additional action must be taken by the client to complete the request

B.

the server takes responsibility for error status codes

C.

communication of transfer protocol-level information

D.

successful acceptance of the client’s request

Questions # 3:

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

Options:

A.

domain belongs to a competitor

B.

log in during non-working hours

C.

email forwarding to an external domain

D.

log in from a first-seen country

E.

increased number of sent mails

Questions # 4:

A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?

Options:

A.

IaaS

B.

PaaS

C.

DaaS

D.

SaaS

Questions # 5:

A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server. Which security solution is needed at this stage to mitigate the attack?

Options:

A.

web security solution

B.

email security solution

C.

endpoint security solution

D.

network security solution

Questions # 6:

An organization lost connectivity to critical servers, and users cannot access business applications and internal websites. An engineer checks the network devices to investigate the outage and determines that all devices are functioning. Drag and drop the steps from the left into the sequence on the right to continue investigating this issue. Not all options are used.

Question # 6

Options:

Questions # 7:

Refer to the exhibit.

Question # 7

Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

Options:

A.

Create an ACL on the firewall to allow only TLS 1.3

B.

Implement a proxy server in the DMZ network

C.

Create an ACL on the firewall to allow only external connections

D.

Move the webserver to the internal network

Questions # 8:

A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company’s confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments. What are the actions a security manager should take?

Options:

A.

Measure confidentiality level of downloaded documents.

B.

Report to the incident response team.

C.

Escalate to contractor’s manager.

D.

Communicate with the contractor to identify the motives.

Questions # 9:

Where do threat intelligence tools search for data to identify potential malicious IP addresses, domain names, and URLs?

Options:

A.

customer data

B.

internal database

C.

internal cloud

D.

Internet

Questions # 10:

Refer to the exhibit.

Question # 10

Based on the detected vulnerabilities, what is the next recommended mitigation step?

Options:

A.

Evaluate service disruption and associated risk before prioritizing patches.

B.

Perform root cause analysis for all detected vulnerabilities.

C.

Remediate all vulnerabilities with descending CVSS score order.

D.

Temporarily shut down unnecessary services until patch deployment ends.

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.