Exam Code: 350-201
Exam Questions: 140
Performing CyberOps Using Core Security Technologies
Updated: 20 Feb, 2026
Viewing Page : 1 - 14
Practicing : 1 - 5 of 140 Questions
Question 1

Refer to the exhibit.

1
Where are the browser page rendering permissions displayed?

Options :
Answer: C

Question 2

An engineer wants to review the packet overviews of SNORT alerts. When printing the SNORT alerts, all the packet headers are included, and the file is too large to utilize. Which action is needed to correct this problem?

Options :
Answer: A

Question 3

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to
prevent this type of attack from reoccurring? (Choose two.)

Options :
Answer: A,D

Question 4

Refer to the exhibit.
1
At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

Options :
Answer: C

Question 5

A company's web server availability was breached by a DDoS attack and was offline for 3 hours because it was not deemed a critical asset in the incident response playbook. Leadership has requested a risk assessment of the asset. An analyst conducted the risk assessment using the threat sources, events, and vulnerabilities. Which additional element is needed to calculate the risk?

Options :
Answer: D

Viewing Page : 1 - 14
Practicing : 1 - 5 of 140 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.