Exam Code: 350-201
Exam Questions: 140
Performing CyberOps Using Core Security Technologies
Updated: 01 Apr, 2026
Viewing Page : 1 - 14
Practicing : 1 - 5 of 140 Questions
Question 1

An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to
prevent this type of attack from reoccurring? (Choose two.)

Options :
Answer: A,D

Question 2

Refer to the exhibit.

1Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?

Options :
Answer: A

Question 3

A company's web server availability was breached by a DDoS attack and was offline for 3 hours because it was not deemed a critical asset in the incident response playbook. Leadership has requested a risk assessment of the asset. An analyst conducted the risk assessment using the threat sources, events, and vulnerabilities. Which additional element is needed to calculate the risk?

Options :
Answer: D

Question 4

Refer to the exhibit.

1
Where are the browser page rendering permissions displayed?

Options :
Answer: C

Question 5

Refer to the exhibit.

1
What is occurring in this packet capture?

Options :
Answer: B

Viewing Page : 1 - 14
Practicing : 1 - 5 of 140 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.