Cisco 350-201 Exam Questions
Performing CyberOps Using Core Security Technologies (CBRCOR) (Page 4 )

Updated On: 21-Feb-2026

Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

Select and Place:

Exhibit A:



Exhibit B:

  1. Please refer to Exhibit B for the answer.

Answer(s): A



According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

  1. Perform a vulnerability assessment
  2. Conduct a data protection impact assessment
  3. Conduct penetration testing
  4. Perform awareness testing

Answer(s): B


Reference:

https://apdcat.gencat.cat/web/.content/03-documentacio/Reglament_general_de_proteccio_de_dades/documents/DPIA-Guide.pdf



A payroll administrator noticed unexpected changes within a piece of software and reported the incident to the incident response team. Which actions should be taken at this step in the incident response workflow?

  1. Classify the criticality of the information, research the attacker’s motives, and identify missing patches
  2. Determine the damage to the business, extract reports, and save evidence according to a chain of custody
  3. Classify the attack vector, understand the scope of the event, and identify the vulnerabilities being exploited
  4. Determine the attack surface, evaluate the risks involved, and communicate the incident according to the escalation plan

Answer(s): B



A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

  1. Identify the business applications running on the assets
  2. Update software to patch third-party software
  3. Validate CSRF by executing exploits within Metasploit
  4. Fix applications according to the risk scores

Answer(s): D



An engineer is analyzing a possible compromise that happened a week ago when the company database servers unexpectedly went down. The analysis reveals that attackers tampered with Microsoft SQL Server Resolution Protocol and launched a DDoS attack. The engineer must act quickly to ensure that all systems are protected. Which two tools should be used to detect and mitigate this type of future attack? (Choose two.)

  1. firewall
  2. Wireshark
  3. autopsy
  4. SHA512
  5. IPS

Answer(s): A,B






Post your Comments and Discuss Cisco 350-201 exam dumps with other Community members:

Join the 350-201 Discussion