Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cisco 350-201 CBRCOR Certification Exam Sample Questions and Answers

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
16-07-2025
Written in
2024/2025

01. Employees report computer system crashes within the same week. An analyst is investigating one of the computers that crashed and discovers multiple shortcuts in the system's startup folder. It appears that the shortcuts redirect users to malicious URLs. What is the next step the engineer should take to investigate this case? a) Remove the shortcut files b) Check the audit logs c) Identify affected systems d) Investigate the malicious URLs - Answer: c) Identify affected systems 02. According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability? a) Perform a vulnerability assessment b) Conduct a data protection impact assessment c) Conduct penetration testing d) Perform awareness testing - Answer: b) Conduct a data protection impact assessment 03. How does Wireshark decrypt TLS network traffic? a) with a key log file using per-session secrets b) using an RSA public key c) by observing DH key exchange d) by defining a user-specified decode-as - Answer: a) with a key log file using per-session secrets 04. The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource. What is the next step? a) Conduct a risk assessment of systems and applications b) Isolate the infected host from the rest of the subnet c) Install malware prevention software on the host d) Analyze network traffic on the host's subnet - Answer: b) Isolate the infected host from the rest of the subnet 05. How is a SIEM tool used? a) To collect security data from authentication failures and cyber attacks and forward it for analysis b) To search and compare security data against acceptance standards and generate reports for analysis c) To compare security alerts against configured scenarios and trigger system responses d) To collect and analyze security data from network devices and servers and produce alerts - Answer: d) To collect and analyze security data from network devices and servers and produce alerts If You want to get more details for Preparation of Cisco 350-201 Certification Exam: Click Here--- -

Show more Read less
Institution
Beacon
Course
Beacon

Content preview

Palo Alto All Questions And Answers




A
R
U
LA
C
O
D

,C - ANS In which cloud computing service model does a provider's applications run on a
cloud infrastructure and the consumer does not manage or control the underlying infrastructure?
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS)
D. Public Cloud




A
T - ANS Business intelligence (BI) software consists of tools and techniques used to
surface large amounts of raw unstructured data to perform a variety of tasks including data
mining, event processing, and predictive analytics. (True or False)




R
T - ANS The process in which end users find personal technology and apps that are more
powerful or capable, more convenient, less expensive, quicker to install, and easier to use than
enterprise IT solutions is known as consumerization. (True or False)



U
T - ANS An organization can be compliant with all applicable security and privacy
regulations for its industry, yet still not be secure. (True or False)
LA
HIPAA - ANS The U.S. law that establishes national standards to protect individuals'
medical records and other health information is known as _______.

F - ANS Most cyberattacks today are perpetrated by internal threat actors such as
malicious employees engaging in corporate espionage. (True or False)
C

F - ANS The Cyber-Attack Lifecycle is a five-step process that an attacker goes through to
attack a network. (True or False)
O


Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control,
Actions on Objectives - ANS List the steps of the Cyber-Attack Lifecycle.
D



F - ANS An attacker needs to succeed in executing only one step of the Cyber-Attack
Lifecycle to infiltrate a network, whereas a defender must "be right every time" and break every
step of the chain to prevent an attack. (True or False)

C - ANS Which technique is not used to break the command-and-control (C&C) phase of
the Cyber-Attack Lifecycle?
A. Blocking outbound traffic to known malicious sites and IP addresses
B. DNS sinkholing and DNS poisoning
C. Vulnerability and patch management
D. All of the above

,T - ANS The key to breaking the Cyber-Attack Lifecycle during the Installation phase is to
implement network segmentation, a Zero Trust model, and granular control of applications to
limit or restrict an attacker's lateral movement within the network. (True or False)

T - ANS Network firewalls cannot completely protect hosts from zero-day exploits. (True or
False)

Zero-day - ANS _______________ exploits target unknown vulnerabilities in operating
system and application software on a host machine.




A
B - ANS Which option describes malicious software or code that typically takes control of,
collects information from, or damages an infected endpoint?
A. Exploit




R
B. Malware
C. Vulnerability
D. None of the above




U
D - ANS Which option is an important characteristic or capability of advanced malware?
A. Distributed, fault-tolerant architecture
B. Multi-functionality
LA
C. Hiding techniques such as polymorphism, metamorphism, and obfuscation
D. All of the above

F - ANS A vulnerability is a small piece of software code, part of a malformed data file, or a
sequence (string) of commands created by an attacker to cause unintended or unanticipated
behavior in a system or software. (True or False)
C

F - ANS New exploits can be crafted from any number of more than a thousand core
exploit techniques. (True or False)
O


F - ANS Wired Equivalent Privacy (WEP) is an effective protocol for securing wireless
networks. (True or False)
D



hash - ANS A _________________ is a mathematical function that creates a unique
representation of a larger set of data in a manner that is easy to compute in one direction, but
not in the reverse direction.

router - ANS A _________________ sends data packets to destination networks along a
network path using logical addresses.

C - ANS Which option is an example of a static routing protocol?
A. Open Shortest Path First (OSPF)
B. Border Gateway Protocol (BGP)

, C. Routing Information Protocol (RIP)
D. Split horizon

ABC - ANS Which three options are dynamic routing protocols? (Choose three.)
A. Distance-vector
B. Path-vector
C. Link-state
D. Point-to-point

T - ANS The internet is an example of a wide-area network (WAN). (True or False)




A
DNS - ANS _________________ is a distributed, hierarchical internet database that maps
FQDNs to IP addresses.




R
A - ANS Which option is an example of a logical address?
A. IP address
B. Hardware address
C. MAC address



U
D. Burned-in address

8 - ANS An IPv4 address consists of four ______-bit octets.
LA
Subnetting - ANS _________________ is a technique used to divide a large network into
smaller, multiple subnetworks by segmenting an IPv4 address into a network and host portion.

C - ANS The OSI model consists of how many layers?
A. Four
C

B. Six
C. Seven
D. Nine
O


AC - ANS Which two protocols function at the Transport layer of the OSI model?
A. Transmission Control Protocol (TCP)
B. Internet Protocol (IP)
D



C. User Datagram Protocol (UDP)
D. Hypertext Transfer Protocol (HTTP)

LLC and MAC - ANS The Data Link layer of the OSI model is further divided into these two
sublayers: _____ and _____.

ABDE - ANS Which four layers comprise the TCP/IP model? (Choose four.)
A. Application
B. Transport
C. Physical

Written for

Institution
Beacon
Course
Beacon

Document information

Uploaded on
July 16, 2025
Number of pages
33
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DocLaura Galen College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
159
Member since
2 year
Number of followers
38
Documents
6400
Last sold
1 week ago

4.2

44 reviews

5
27
4
4
3
10
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions