Questions for the 350-201 were updated on : Dec 03 ,2025
Refer to the exhibit.
Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the
threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a
quarantine VLAN using Adaptive Network Control policy. Which method was used to signal ISE to
quarantine the endpoints?
C
Refer to the exhibit.
Where are the browser page rendering permissions displayed?
C
After a recent malware incident, the forensic investigator is gathering details to identify the breach
and causes. The investigator has isolated the affected workstation. What is the next step that should
be taken in this investigation?
C
An analyst received multiple alerts on the SIEM console of users that are navigating to malicious
URLs. The analyst needs to automate the task of receiving alerts and processing the data for further
investigations. Three variables are available from the SIEM console to include in an automation
script: console_ip, api_token, and reference_set_name. What must be added to this script to receive
a successful HTTP response?
#!/usr/bin/python import sys import requests
C
What is the difference between process orchestration and automation?
A
What is the impact of hardening machine images for deployment?
A
A security incident affected an organization’s critical business services, and the customer-side web
API became unresponsive and crashed. An investigation revealed a spike of API call requests and a
high number of inactive sessions during the incident. Which two recommendations should the
engineers make to prevent similar incidents in the future? (Choose two.)
BD
Engineers are working to document, list, and discover all used applications within an organization.
During the regular assessment of applications from the HR backup server, an engineer discovered an
unknown application. The analysis showed that the application is communicating with external
addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown
application does not have an owner and is not being used by a business unit. What are the next two
steps the engineers should take in this investigation? (Choose two.)
AD
A cloud engineer needs a solution to deploy applications on a cloud without being able to manage
and control the server OS. Which type of cloud environment should be used?
A
A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the
incident response team to block the malicious URLs requested on the firewall. Which action will
improve the effectiveness of the process?
A
Refer to the exhibit.
An engineer is performing static analysis of a file received and reported by a user. Which risk is
indicated in this STIX?
D
An engineer received multiple reports from users trying to access a company website and instead of
landing on the website, they are redirected to a malicious website that asks them to fill in sensitive
personal dat
a. Which type of attack is occurring?
D
Which bash command will print all lines from the “colors.txt” file containing the non case-sensitive
pattern “Yellow”?
A
Refer to the exhibit.
Two types of clients are accessing the front ends and the core database that manages transactions,
access control, and atomicity. What is the threat model for the SQL database?
A
An organization suffered a security breach in which the attacker exploited a Netlogon Remote
Protocol vulnerability for further privilege escalation. Which two actions should the incident
response team take to
prevent this type of attack from reoccurring? (Choose two.)
DE