Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Performing CyberOps Using Core Security Technologies (CBRCOR) Question and Answers

Performing CyberOps Using Core Security Technologies (CBRCOR)

Last Update Oct 2, 2025
Total Questions : 139

We are offering FREE 350-201 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-201 free exam questions and then go for complete pool of Performing CyberOps Using Core Security Technologies (CBRCOR) test questions that will help you more.

350-201 pdf

350-201 PDF

$46  $114.99
350-201 Engine

350-201 Testing Engine

$54  $134.99
350-201 PDF + Engine

350-201 PDF + Testing Engine

$70  $174.99
Questions 1

Refer to the exhibit.

Where is the MIME type that should be followed indicated?

Options:

A.  

x-test-debug

B.  

strict-transport-security

C.  

x-xss-protection

D.  

x-content-type-options

Discussion 0
Questions 2

An engineer is investigating several cases of increased incoming spam emails and suspicious emails from the HR and service departments. While checking the event sources, the website monitoring tool showed several web scraping alerts overnight. Which type of compromise is indicated?

Options:

A.  

phishing

B.  

dumpster diving

C.  

social engineering

D.  

privilege escalation

Discussion 0
Questions 3

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?

Options:

A.  

Contain the malware

B.  

Install IPS software

C.  

Determine the escalation path

D.  

Perform vulnerability assessment

Discussion 0
Questions 4

The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?

Options:

A.  

eradication and recovery

B.  

post-incident activity

C.  

containment

D.  

detection and analysis

Discussion 0
Questions 5

An engineer notices that unauthorized software was installed on the network and discovers that it was installed by a dormant user account. The engineer suspects an escalation of privilege attack and responds to the incident. Drag and drop the activities from the left into the order for the response on the right.

Options:

Discussion 0
Questions 6

An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?

Options:

A.  

chmod +x ex.sh

B.  

source ex.sh

C.  

chroot ex.sh

D.  

sh ex.sh

Discussion 0
Questions 7

A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server. Which security solution is needed at this stage to mitigate the attack?

Options:

A.  

web security solution

B.  

email security solution

C.  

endpoint security solution

D.  

network security solution

Discussion 0
Questions 8

After a recent malware incident, the forensic investigator is gathering details to identify the breach and causes. The investigator has isolated the affected workstation. What is the next step that should be taken in this investigation?

Options:

A.  

Analyze the applications and services running on the affected workstation.

B.  

Compare workstation configuration and asset configuration policy to identify gaps.

C.  

Inspect registry entries for recently executed files.

D.  

Review audit logs for privilege escalation events.

Discussion 0
Questions 9

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine. What should be concluded from this report?

Options:

A.  

Threat scores are high, malicious ransomware has been detected, and files have been modified

B.  

Threat scores are low, malicious ransomware has been detected, and files have been modified

C.  

Threat scores are high, malicious activity is detected, but files have not been modified

D.  

Threat scores are low and no malicious file activity is detected

Discussion 0
Questions 10

A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?

Options:

A.  

IaaS

B.  

PaaS

C.  

DaaS

D.  

SaaS

Discussion 0
Questions 11

An organization had a breach due to a phishing attack. An engineer leads a team through the recovery phase of the incident response process. Which action should be taken during this phase?

Options:

A.  

Host a discovery meeting and define configuration and policy updates

B.  

Update the IDS/IPS signatures and reimage the affected hosts

C.  

Identify the systems that have been affected and tools used to detect the attack

D.  

Identify the traffic with data capture using Wireshark and review email filters

Discussion 0
Questions 12

Refer to the exhibit.

Where does it signify that a page will be stopped from loading when a scripting attack is detected?

Options:

A.  

x-frame-options

B.  

x-content-type-options

C.  

x-xss-protection

D.  

x-test-debug

Discussion 0
Questions 13

Drag and drop the function on the left onto the mechanism on the right.

Options:

Discussion 0
Questions 14

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?

Options:

A.  

HIPAA

B.  

PCI-DSS

C.  

Sarbanes-Oxley

D.  

GDPR

Discussion 0
Questions 15

Refer to the exhibit.

Which code snippet will parse the response to identify the status of the domain as malicious, clean or undefined?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 16

Employees report computer system crashes within the same week. An analyst is investigating one of the computers that crashed and discovers multiple shortcuts in the system’s startup folder. It appears that the shortcuts redirect users to malicious URLs. What is the next step the engineer should take to investigate this case?

Options:

A.  

Remove the shortcut files

B.  

Check the audit logs

C.  

Identify affected systems

D.  

Investigate the malicious URLs

Discussion 0
Questions 17

What is needed to assess risk mitigation effectiveness in an organization?

Options:

A.  

analysis of key performance indicators

B.  

compliance with security standards

C.  

cost-effectiveness of control measures

D.  

updated list of vulnerable systems

Discussion 0
Questions 18

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

Options:

A.  

domain belongs to a competitor

B.  

log in during non-working hours

C.  

email forwarding to an external domain

D.  

log in from a first-seen country

E.  

increased number of sent mails

Discussion 0
Questions 19

Refer to the exhibit.

A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker. Which tool should the analyst use to identify the source IP of the offender?

Options:

A.  

packet sniffer

B.  

malware analysis

C.  

SIEM

D.  

firewall manager

Discussion 0
Questions 20

Refer to the exhibit.

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?

Options:

A.  

Use VLANs to segregate zones and the firewall to allow only required services and secured protocols

B.  

Deploy a SOAR solution and correlate log alerts from customer zones

C.  

Deploy IDS within sensitive areas and continuously update signatures

D.  

Use syslog to gather data from multiple sources and detect intrusion logs for timely responses

Discussion 0
Questions 21

A security incident affected an organization’s critical business services, and the customer-side web API became unresponsive and crashed. An investigation revealed a spike of API call requests and a high number of inactive sessions during the incident. Which two recommendations should the engineers make to prevent similar incidents in the future? (Choose two.)

Options:

A.  

Configure shorter timeout periods.

B.  

Determine API rate-limiting requirements.

C.  

Implement API key maintenance.

D.  

Automate server-side error reporting for customers.

E.  

Decrease simultaneous API responses.

Discussion 0
Questions 22

Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

Options:

Discussion 0
Questions 23

A threat actor attacked an organization’s Active Directory server from a remote location, and in a thirty-minute timeframe, stole the password for the administrator account and attempted to access 3 company servers. The threat actor successfully accessed the first server that contained sales data, but no files were downloaded. A second server was also accessed that contained marketing information and 11 files were downloaded. When the threat actor accessed the third server that contained corporate financial data, the session was disconnected, and the administrator’s account was disabled. Which activity triggered the behavior analytics tool?

Options:

A.  

accessing the Active Directory server

B.  

accessing the server with financial data

C.  

accessing multiple servers

D.  

downloading more than 10 files

Discussion 0
Questions 24

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

Options:

A.  

Analyze environmental threats and causes

B.  

Inform the product security incident response team to investigate further

C.  

Analyze the precursors and indicators

D.  

Inform the computer security incident response team to investigate further

Discussion 0
Questions 25

The physical security department received a report that an unauthorized person followed an authorized individual to enter a secured premise. The incident was documented and given to a security specialist to analyze. Which step should be taken at this stage?

Options:

A.  

Determine the assets to which the attacker has access

B.  

Identify assets the attacker handled or acquired

C.  

Change access controls to high risk assets in the enterprise

D.  

Identify movement of the attacker in the enterprise

Discussion 0
Questions 26

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

Options:

A.  

x-frame-options

B.  

x-xss-protection

C.  

x-content-type-options

D.  

x-test-debug

Discussion 0
Questions 27

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?

Options:

A.  

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores do not indicate the likelihood of malicious ransomware.

B.  

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores are high and do not indicate the likelihood of malicious ransomware.

C.  

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the

scores are high and indicate the likelihood that malicious ransomware has been detected.

D.  

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the scores are low and indicate the likelihood that malicious ransomware has been detected.

Discussion 0
Questions 28

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack. Which step was missed that would have prevented this breach?

Options:

A.  

use of the Nmap tool to identify the vulnerability when the new code was deployed

B.  

implementation of a firewall and intrusion detection system

C.  

implementation of an endpoint protection system

D.  

use of SecDevOps to detect the vulnerability during development

Discussion 0
Questions 29

Refer to the exhibit.

An organization is using an internal application for printing documents that requires a separate registration on the website. The application allows format-free user creation, and users must match these required conditions to comply with the company’s user creation policy:

    minimum length: 3

    usernames can only use letters, numbers, dots, and underscores

    usernames cannot begin with a number

The application administrator has to manually change and track these daily to ensure compliance. An engineer is tasked to implement a script to automate the process according to the company user creation policy. The engineer implemented this piece of code within the application, but users are still able to create format-free usernames. Which change is needed to apply the restrictions?

Options:

A.  

modify code to return error on restrictions def return false_user(username, minlen)

B.  

automate the restrictions def automate_user(username, minlen)

C.  

validate the restrictions, def validate_user(username, minlen)

D.  

modify code to force the restrictions, def force_user(username, minlen)

Discussion 0
Questions 30

A malware outbreak is detected by the SIEM and is confirmed as a true positive. The incident response team follows the playbook to mitigate the threat. What is the first action for the incident response team?

Options:

A.  

Assess the network for unexpected behavior

B.  

Isolate critical hosts from the network

C.  

Patch detected vulnerabilities from critical hosts

D.  

Perform analysis based on the established risk factors

Discussion 0
Questions 31

Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.

Options:

Discussion 0
Questions 32

Refer to the exhibit.

An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?

Options:

A.  

Top Peers

B.  

Top Hosts

C.  

Top Conversations

D.  

Top Ports

Discussion 0
Questions 33

A SOC analyst is notified by the network monitoring tool that there are unusual types of internal traffic on IP subnet 103.861.2117.0/24. The analyst discovers unexplained encrypted data files on a computer system that belongs on that specific subnet. What is the cause of the issue?

Options:

A.  

DDoS attack

B.  

phishing attack

C.  

virus outbreak

D.  

malware outbreak

Discussion 0
Questions 34

Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.

Options:

Discussion 0
Questions 35

Refer to the exhibit.

The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

Options:

Discussion 0
Questions 36

Refer to the exhibit.

An employee is a victim of a social engineering phone call and installs remote access software to allow an “MS Support” technician to check his machine for malware. The employee becomes suspicious after the remote technician requests payment in the form of gift cards. The employee has copies of multiple, unencrypted database files, over 400 MB each, on his system and is worried that the scammer copied the files off but has no proof of it. The remote technician was connected sometime between 2:00 pm and 3:00 pm over https. What should be determined regarding data loss between the employee’s laptop and the remote technician’s system?

Options:

A.  

No database files were disclosed

B.  

The database files were disclosed

C.  

The database files integrity was violated

D.  

The database files were intentionally corrupted, and encryption is possible

Discussion 0
Questions 37

The SIEM tool informs a SOC team of a suspicious file. The team initializes the analysis with an automated sandbox tool, sets up a controlled laboratory to examine the malware specimen, and proceeds with behavioral analysis. What is the next step in the malware analysis process?

Options:

A.  

Perform static and dynamic code analysis of the specimen.

B.  

Unpack the specimen and perform memory forensics.

C.  

Contain the subnet in which the suspicious file was found.

D.  

Document findings and clean-up the laboratory.

Discussion 0
Questions 38

A SOC engineer discovers that the organization had three DDOS attacks overnight. Four servers are reported offline, even though the hardware seems to be working as expected. One of the offline servers is affecting the pay system reporting times. Three employees, including executive management, have reported ransomware on their laptops. Which steps help the engineer understand a comprehensive overview of the incident?

Options:

A.  

Run and evaluate a full packet capture on the workloads, review SIEM logs, and define a root cause.

B.  

Run and evaluate a full packet capture on the workloads, review SIEM logs, and plan mitigation steps.

C.  

Check SOAR to learn what the security systems are reporting about the overnight events, research the attacks, and plan mitigation step.

D.  

Check SOAR to know what the security systems are reporting about the overnight events, review the threat vectors, and define a root cause.

Discussion 0
Questions 39

A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?

Options:

A.  

Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack

B.  

Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities

C.  

Review the server backup and identify server content and data criticality to assess the intrusion risk

D.  

Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious

Discussion 0
Questions 40

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?

Options:

A.  

Disable BIND forwarding from the DNS server to avoid reconnaissance.

B.  

Disable affected assets and isolate them for further investigation.

C.  

Configure affected devices to disable NETRJS protocol.

D.  

Configure affected devices to disable the Finger service.

Discussion 0
Questions 41

Refer to the exhibit.

An engineer is analyzing this Vlan0386-int12-117.pcap file in Wireshark after detecting a suspicious network activity. The origin header for the direct IP connections in the packets was initiated by a google chrome extension on a WebSocket protocol. The engineer checked message payloads to determine what information was being sent off-site but the payloads are obfuscated and unreadable. What does this STIX indicate?

Options:

A.  

The extension is not performing as intended because of restrictions since ports 80 and 443 should be accessible

B.  

The traffic is legitimate as the google chrome extension is reaching out to check for updates and fetches this information

C.  

There is a possible data leak because payloads should be encoded as UTF-8 text

D.  

There is a malware that is communicating via encrypted channels to the command and control server

Discussion 0