View Mode
Q: 11
Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)
Options
Q: 12
Refer to the exhibit. 350-201 question Where are the browser page rendering permissions displayed?
Options
Q: 13
An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)
Options
Q: 14

DRAG DROP Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right. 350-201 question

Drag & Drop
Q: 15

DRAG DROP Drag and drop the function on the left onto the mechanism on the right. 350-201 question

Drag & Drop
Q: 16

DRAG DROP Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right. 350-201 question

Drag & Drop
Q: 17

DRAG DROP Refer to the exhibit. 350-201 question The Cisco Secure Network Analytics (Stealthwatch) console alerted with “New Malware Server Discovered” and the IOC indicates communication from an end-user desktop to a Zeus C&C Server. Drag and drop the actions that the analyst should take from the left into the order on the right to investigate and remediate this IOC. 350-201 question

Drag & Drop
Q: 18

DRAG DROP Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right. 350-201 question

Drag & Drop
Q: 19

DRAG DROP Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right. 350-201 question

Drag & Drop
Q: 20

DRAG DROP Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right. 350-201 question

Drag & Drop
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE