Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
350-201
Free trial
By cisco
Verified
25Q per page
Question 26
A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross-correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?
- A: Disable BIND forwarding from the DNS server to avoid reconnaissance.
- B: Disable affected assets and isolate them for further investigation.
- C: Configure affected devices to disable NETRJS protocol.
- D: Configure affected devices to disable the Finger service.
—
Question 27
What is idempotence?
- A: the assurance of system uniformity throughout the whole delivery process
- B: the ability to recover from failures while keeping critical services running
- C: the necessity of setting maintenance of individual deployment environments
- D: the ability to set the target environment configuration regardless of the starting state
—
Question 28
A security architect in an automotive factory is working on the Cyber Security Management System and is implementing procedures and creating policies to prevent attacks. Which standard must the architect apply?
- A: IEC62446
- B: IEC62443
- C: IEC62439-3
- D: IEC62439-2
—
That’s the end of your free questions
You’ve reached the preview limit for 350-201Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!