Cisco® 350-201 Exam Practice Questions (P. 4)
- Full Access (139 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?
- AHIPAA
- BPCI-DSS
- CSarbanes-Oxley
- DGDPRMost Voted
Correct Answer:
D
Reference:
https://www.thesslstore.com/blog/10-data-privacy-and-encryption-laws-every-business-needs-to-know/
D
Reference:
https://www.thesslstore.com/blog/10-data-privacy-and-encryption-laws-every-business-needs-to-know/
send
light_mode
delete
Question #17
An organization had a breach due to a phishing attack. An engineer leads a team through the recovery phase of the incident response process. Which action should be taken during this phase?
- AHost a discovery meeting and define configuration and policy updates
- BUpdate the IDS/IPS signatures and reimage the affected hostsMost Voted
- CIdentify the systems that have been affected and tools used to detect the attack
- DIdentify the traffic with data capture using Wireshark and review email filters
Correct Answer:
C
C
send
light_mode
delete
Question #18
An engineer is going through vulnerability triage with company management because of a recent malware outbreak from which 21 affected assets need to be patched or remediated. Management decides not to prioritize fixing the assets and accepts the vulnerabilities. What is the next step the engineer should take?
- AInvestigate the vulnerability to prevent further spread
- BAcknowledge the vulnerabilities and document the riskMost Voted
- CApply vendor patches or available hot fixes
- DIsolate the assets affected in a separate network
Correct Answer:
D
D
send
light_mode
delete
Question #19
The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive.
The team collects and documents all the necessary evidence from the computing resource. What is the next step?
The team collects and documents all the necessary evidence from the computing resource. What is the next step?
- AConduct a risk assessment of systems and applications
- BIsolate the infected host from the rest of the subnetMost Voted
- CInstall malware prevention software on the host
- DAnalyze network traffic on the host's subnet
Correct Answer:
B
B
send
light_mode
delete
Question #20
DRAG DROP -
An engineer notices that unauthorized software was installed on the network and discovers that it was installed by a dormant user account. The engineer suspects an escalation of privilege attack and responds to the incident. Drag and drop the activities from the left into the order for the response on the right.
Select and Place:

An engineer notices that unauthorized software was installed on the network and discovers that it was installed by a dormant user account. The engineer suspects an escalation of privilege attack and responds to the incident. Drag and drop the activities from the left into the order for the response on the right.
Select and Place:

send
light_mode
delete
All Pages