Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

350-201 Questions and Answers

Question # 6

Refer to the exhibit.

Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

A.

Create an ACL on the firewall to allow only TLS 1.3

B.

Implement a proxy server in the DMZ network

C.

Create an ACL on the firewall to allow only external connections

D.

Move the webserver to the internal network

Full Access
Question # 7

Refer to the exhibit.

An engineer is performing static analysis of a file received and reported by a user. Which risk is indicated in this STIX?

A.

The file is redirecting users to a website that requests privilege escalations from the user.

B.

The file is redirecting users to the website that is downloading ransomware to encrypt files.

C.

The file is redirecting users to a website that harvests cookies and stored account information.

D.

The file is redirecting users to a website that is determining users’ geographic location.

Full Access
Question # 8

Refer to the exhibit.

Which asset has the highest risk value?

A.

servers

B.

website

C.

payment process

D.

secretary workstation

Full Access
Question # 9

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

A.

Identify the business applications running on the assets

B.

Update software to patch third-party software

C.

Validate CSRF by executing exploits within Metasploit

D.

Fix applications according to the risk scores

Full Access
Question # 10

An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?

A.

HIPAA

B.

FISMA

C.

COBIT

D.

PCI DSS

Full Access
Question # 11

Refer to the exhibit.

Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy. Which method was used to signal ISE to quarantine the endpoints?

A.

SNMP

B.

syslog

C.

REST API

D.

pxGrid

Full Access
Question # 12

Refer to the exhibit.

Where is the MIME type that should be followed indicated?

A.

x-test-debug

B.

strict-transport-security

C.

x-xss-protection

D.

x-content-type-options

Full Access
Question # 13

Refer to the exhibit.

What results from this script?

A.

Seeds for existing domains are checked

B.

A search is conducted for additional seeds

C.

Domains are compared to seed rules

D.

A list of domains as seeds is blocked

Full Access
Question # 14

An engineer received an incident ticket of a malware outbreak and used antivirus and malware removal tools to eradicate the threat. The engineer notices that abnormal processes are still occurring in the system and determines that manual intervention is needed to clean the infected host and restore functionality. What is the next step the engineer should take to complete this playbook step?

A.

Scan the network to identify unknown assets and the asset owners.

B.

Analyze the components of the infected hosts and associated business services.

C.

Scan the host with updated signatures and remove temporary containment.

D.

Analyze the impact of the malware and contain the artifacts.

Full Access
Question # 15

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to

prevent this type of attack from reoccurring? (Choose two.)

A.

Implement a patch management process.

B.

Scan the company server files for known viruses.

C.

Apply existing patches to the company servers.

D.

Automate antivirus scans of the company servers.

E.

Define roles and responsibilities in the incident response playbook.

Full Access
Question # 16

Refer to the exhibit.

The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC.

Full Access
Question # 17

Refer to the exhibit.

An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?

A.

Top Peers

B.

Top Hosts

C.

Top Conversations

D.

Top Ports

Full Access
Question # 18

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop automatically submitted a low prevalence file to the Threat Grid analysis engine. What should be concluded from this report?

A.

Threat scores are high, malicious ransomware has been detected, and files have been modified

B.

Threat scores are low, malicious ransomware has been detected, and files have been modified

C.

Threat scores are high, malicious activity is detected, but files have not been modified

D.

Threat scores are low and no malicious file activity is detected

Full Access
Question # 19

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed. A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

A.

Run the program through a debugger to see the sequential actions

B.

Unpack the file in a sandbox to see how it reacts

C.

Research the malware online to see if there are noted findings

D.

Disassemble the malware to understand how it was constructed

Full Access
Question # 20

According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

A.

Perform a vulnerability assessment

B.

Conduct a data protection impact assessment

C.

Conduct penetration testing

D.

Perform awareness testing

Full Access
Question # 21

Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.

Full Access
Question # 22

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?

A.

Disable memory limit.

B.

Disable CPU threshold trap toward the SNMP server.

C.

Enable memory tracing notifications.

D.

Enable memory threshold notifications.

Full Access
Question # 23

A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?

A.

Create a rule triggered by 3 failed VPN connection attempts in an 8-hour period

B.

Create a rule triggered by 1 successful VPN connection from any nondestination country

C.

Create a rule triggered by multiple successful VPN connections from the destination countries

D.

Analyze the logs from all countries related to this user during the traveling period

Full Access
Question # 24

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?

A.

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores do not indicate the likelihood of malicious ransomware.

B.

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores are high and do not indicate the likelihood of malicious ransomware.

C.

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the

scores are high and indicate the likelihood that malicious ransomware has been detected.

D.

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the scores are low and indicate the likelihood that malicious ransomware has been detected.

Full Access
Question # 25

Refer to the exhibit.

Where does it signify that a page will be stopped from loading when a scripting attack is detected?

A.

x-frame-options

B.

x-content-type-options

C.

x-xss-protection

D.

x-test-debug

Full Access