Free 350-201 Exam Braindumps (page: 12)

Page 11 of 35

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?

  1. Analyze environmental threats and causes
  2. Inform the product security incident response team to investigate further
  3. Analyze the precursors and indicators
  4. Inform the computer security incident response team to investigate further

Answer(s): C



An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?

  1. ExecutedMalware.ioc
  2. Crossrider.ioc
  3. ConnectToSuspiciousDomain.ioc
  4. W32 AccesschkUtility.ioc

Answer(s): D



Refer to the exhibit. Which command was executed in PowerShell to generate this log?

  1. Get-EventLog -LogName*
  2. Get-EventLog -List
  3. Get-WinEvent -ListLog* -ComputerName localhost
  4. Get-WinEvent -ListLog*

Answer(s): A


Reference:

https://lists.xymon.com/archive/2019-March/046125.html



Refer to the exhibit. Cisco Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a Quarantine VLAN using Adaptive Network Control policy. Which telemetry feeds were correlated with SMC to identify the malware?

  1. NetFlow and event data
  2. event data and syslog data
  3. SNMP and syslog data
  4. NetFlow and SNMP

Answer(s): B






Post your Comments and Discuss Cisco® 350-201 exam with other Community members:

350-201 Discussions & Posts