Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

350-201 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

350-201 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 139
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

350-201 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

350-201 Practice Exam Questions with Answers Performing CyberOps Using Core Security Technologies (CBRCOR) Certification

Question # 6

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Full Access
Question # 7

A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server. Which security solution is needed at this stage to mitigate the attack?

A.

web security solution

B.

email security solution

C.

endpoint security solution

D.

network security solution

Full Access
Question # 8

An engineer notices that every Sunday night, there is a two-hour period with a large load of network activity. Upon further investigation, the engineer finds that the activity is from locations around the globe outside the organization’s service area. What are the next steps the engineer must take?

A.

Assign the issue to the incident handling provider because no suspicious activity has been observed during business hours.

B.

Review the SIEM and FirePower logs, block all traffic, and document the results of calling the call center.

C.

Define the access points using StealthWatch or SIEM logs, understand services being offered during the hours in QUESTION NO:, and cross-correlate other source events.

D.

Treat it as a false positive, and accept the SIEM issue as valid to avoid alerts from triggering on weekends.

Full Access
Question # 9

Refer to the exhibit.

350-201 question answer

Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy. Which method was used to signal ISE to quarantine the endpoints?

A.

SNMP

B.

syslog

C.

REST API

D.

pxGrid

Full Access
Question # 10

Which bash command will print all lines from the “colors.txt” file containing the non case-sensitive pattern “Yellow”?

A.

grep -i “yellow” colors.txt

B.

locate “yellow” colors.txt

C.

locate -i “Yellow” colors.txt

D.

grep “Yellow” colors.txt

Full Access
Question # 11

How does Wireshark decrypt TLS network traffic?

A.

with a key log file using per-session secrets

B.

using an RSA public key

C.

by observing DH key exchange

D.

by defining a user-specified decode-as

Full Access
Question # 12

What is a limitation of cyber security risk insurance?

A.

It does not cover the costs to restore stolen identities as a result of a cyber attack

B.

It does not cover the costs to hire forensics experts to analyze the cyber attack

C.

It does not cover the costs of damage done by third parties as a result of a cyber attack

D.

It does not cover the costs to hire a public relations company to help deal with a cyber attack

Full Access
Question # 13

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to

prevent this type of attack from reoccurring? (Choose two.)

A.

Implement a patch management process.

B.

Scan the company server files for known viruses.

C.

Apply existing patches to the company servers.

D.

Automate antivirus scans of the company servers.

E.

Define roles and responsibilities in the incident response playbook.

Full Access
Question # 14

A security incident affected an organization’s critical business services, and the customer-side web API became unresponsive and crashed. An investigation revealed a spike of API call requests and a high number of inactive sessions during the incident. Which two recommendations should the engineers make to prevent similar incidents in the future? (Choose two.)

A.

Configure shorter timeout periods.

B.

Determine API rate-limiting requirements.

C.

Implement API key maintenance.

D.

Automate server-side error reporting for customers.

E.

Decrease simultaneous API responses.

Full Access
Question # 15

The SIEM tool informs a SOC team of a suspicious file. The team initializes the analysis with an automated sandbox tool, sets up a controlled laboratory to examine the malware specimen, and proceeds with behavioral analysis. What is the next step in the malware analysis process?

A.

Perform static and dynamic code analysis of the specimen.

B.

Unpack the specimen and perform memory forensics.

C.

Contain the subnet in which the suspicious file was found.

D.

Document findings and clean-up the laboratory.

Full Access
Question # 16

An engineer received multiple reports from users trying to access a company website and instead of landing on the website, they are redirected to a malicious website that asks them to fill in sensitive personal data. Which type of attack is occurring?

A.

Address Resolution Protocol poisoning

B.

session hijacking attack

C.

teardrop attack

D.

Domain Name System poisoning

Full Access
Question # 17

A customer is using a central device to manage network devices over SNMPv2. A remote attacker caused a denial of service condition and can trigger this vulnerability by issuing a GET request for the ciscoFlashMIB OID on an affected device. Which should be disabled to resolve the issue?

A.

SNMPv2

B.

TCP small services

C.

port UDP 161 and 162

D.

UDP small services

Full Access
Question # 18

Refer to the exhibit.

350-201 question answer

Where are the browser page rendering permissions displayed?

A.

x-frame-options

B.

x-xss-protection

C.

x-content-type-options

D.

x-test-debug

Full Access