350-201 Dumps

350-201 Free Practice Test

Cisco 350-201: Performing CyberOps Using Core Security Technologies (CBRCOR)

QUESTION 11

Refer to the exhibit.
350-201 dumps exhibit
A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

Correct Answer: A

QUESTION 12

Refer to the exhibit.
350-201 dumps exhibit
A threat actor behind a single computer exploited a cloud-based application by sending multiple concurrent API requests. These requests made the application unresponsive. Which solution protects the application from being overloaded and ensures more equitable application access across the end-user community?

Correct Answer: A

QUESTION 13

Refer to the exhibit.
350-201 dumps exhibit
Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?

Correct Answer: C

QUESTION 14

An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their accounts blocked, or credentials reset because of unexpected login times and incorrectly typed credentials. How should the workflow be improved to resolve these issues?

Correct Answer: B

QUESTION 15

What is the HTTP response code when the REST API information requested by the authenticated user cannot be found?

Correct Answer: A