Free 350-201 Exam Braindumps (page: 3)

Page 2 of 35

Refer to the exhibit. Cisco Advanced Malware Protection installed on an end-user desktop has automatically submitted a low prevalence file to the Threat Grid analysis engine for further analysis. What should be concluded from this report?

  1. The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores do not indicate the likelihood of malicious ransomware.
  2. The prioritized behavioral indicators of compromise do not justify the execution of the “ransomware” because the scores are high and do not indicate the likelihood of malicious ransomware.
  3. The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the scores are high and indicate the likelihood that malicious ransomware has been detected.
  4. The prioritized behavioral indicators of compromise justify the execution of the “ransomware” because the scores are low and indicate the likelihood that malicious ransomware has been detected.

Answer(s): C



The physical security department received a report that an unauthorized person followed an authorized individual to enter a secured premise. The incident was documented and given to a security specialist to analyze. Which step should be taken at this stage?

  1. Determine the assets to which the attacker has access
  2. Identify assets the attacker handled or acquired
  3. Change access controls to high risk assets in the enterprise
  4. Identify movement of the attacker in the enterprise

Answer(s): D



A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

  1. incident response playbooks
  2. asset vulnerability assessment
  3. report of staff members with asset relations
  4. key assets and executives
  5. malware analysis report

Answer(s): B,E


Reference:

https://cloudogre.com/risk-assessment/



Refer to the exhibit. At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

  1. exploitation
  2. actions on objectives
  3. delivery
  4. reconnaissance

Answer(s): C


Reference:

https://www2.deloitte.com/content/dam/Deloitte/sg/Documents/risk/sea-risk-cyber-101-july2017.pdf






Post your Comments and Discuss Cisco® 350-201 exam with other Community members:

350-201 Discussions & Posts