Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 5
Total 41 questions
Exam Code: 350-201                Update: Oct 16, 2025
Exam Name: Performing CyberOps Using Core Security Technologies (CBRCOR)

Cisco Performing CyberOps Using Core Security Technologies (CBRCOR) 350-201 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.

Question # 2

Refer to the exhibit.

For IP 192.168.1.209, what are the risk level, activity, and next step?

A.

high risk level, anomalous periodic communication, quarantine with antivirus

B.

critical risk level, malicious server IP, run in a sandboxed environment

C.

critical risk level, data exfiltration, isolate the device

D.

high risk level, malicious host, investigate further

Question # 3

A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?

A.

Create a follow-up report based on the incident documentation.

B.

Perform a vulnerability assessment to find existing vulnerabilities.

C.

Eradicate malicious software from the infected machines.

D.

Collect evidence and maintain a chain-of-custody during further analysis.

Question # 4

A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?

A.

Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack

B.

Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities

C.

Review the server backup and identify server content and data criticality to assess the intrusion risk

D.

Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious

Question # 5

Refer to the exhibit.

Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?

A.

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores do not indicate the likelihood of malicious ransomware.

B.

The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores are high and do not indicate the likelihood of malicious ransomware.

C.

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the

scores are high and indicate the likelihood that malicious ransomware has been detected.

D.

The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the scores are low and indicate the likelihood that malicious ransomware has been detected.

Question # 6

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?

A.

continuous delivery

B.

continuous integration

C.

continuous deployment

D.

continuous monitoring

Question # 7

What is a principle of Infrastructure as Code?

A.

System maintenance is delegated to software systems

B.

Comprehensive initial designs support robust systems

C.

Scripts and manual configurations work together to ensure repeatable routines

D.

System downtime is grouped and scheduled across the infrastructure

Question # 8

An engineer received multiple reports from users trying to access a company website and instead of landing on the website, they are redirected to a malicious website that asks them to fill in sensitive personal data. Which type of attack is occurring?

A.

Address Resolution Protocol poisoning

B.

session hijacking attack

C.

teardrop attack

D.

Domain Name System poisoning

Question # 9

Refer to the exhibit.

Which indicator of compromise is represented by this STIX?

A.

website redirecting traffic to ransomware server

B.

website hosting malware to download files

C.

web server vulnerability exploited by malware

D.

cross-site scripting vulnerability to backdoor server

Question # 10

An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their accounts blocked, or credentials reset because of unexpected login times and incorrectly

typed credentials. How should the workflow be improved to resolve these issues?

A.

Meet with privileged users to increase awareness and modify the rules for threat tags and anomalous behavior alerts

B.

Change the SOAR configuration flow to remove the automatic remediation that is increasing the false positives and triggering threats

C.

Add a confirmation step through which SOAR informs the affected user and asks them to confirm whether they made the attempts

D.

Increase incorrect login tries and tune anomalous user behavior not to affect privileged accounts

Page: 1 / 5
Total 41 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025