Cisco - Big Savings Alert – Don’t Miss This Deal - Ends In 1d 00h 00m 00s Coupon code: 26Y30OFF
  1. Home
  2. Cisco
  3. 350-201 Exam
  4. Free 350-201 Questions

Free Practice Questions for Cisco 350-201 Exam

Pass4Future also provide interactive practice exam software for preparing Cisco Performing CyberOps Using Core Security Technologies (350-201) Exam effectively. You are welcome to explore sample free Cisco 350-201 Exam questions below and also try Cisco 350-201 Exam practice test software.

Page:    1 / 14   
Total 139 questions

Question 1

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?



Answer : D


Question 2

A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?



Answer : D


Question 3

A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company's confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from different departments. What are the actions a security manager should take?



Answer : B


Question 4

An engineer detects an intrusion event inside an organization's network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?



Answer : C


Question 5

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)



Answer : A, D


Page:    1 / 14   
Total 139 questions