Free 350-201 Practice Test Questions 2026

139 Questions


Last Updated On : 20-May-2026


An engineer wants to review the packet overviews of SNORT alerts. When printing the SNORT alerts, all the packet headers are included, and the file is too large to utilize. Which action is needed to correct this problem?


A. Modify the alert rule to “output alert_syslog: output log”


B. Modify the output module rule to “output alert_quick: output filename”


C. Modify the alert rule to “output alert_syslog: output header”


D. Modify the output module rule to “output alert_fast: output filename”





D.
  Modify the output module rule to “output alert_fast: output filename”

An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?


A. HIPAA


B. FISMA


C. COBIT


D. PCI DSS





D.
  PCI DSS

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)


A. domain belongs to a competitor


B. log in during non-working hours


C. email forwarding to an external domain


D. log in from a first-seen country


E. increased number of sent mails





B.
  log in during non-working hours

D.
  log in from a first-seen country

What is the impact of hardening machine images for deployment?


A. reduces the attack surface


B. increases the speed of patch deployment


C. reduces the steps needed to mitigate threats


D. increases the availability of threat alerts





A.
  reduces the attack surface

An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their accounts blocked, or credentials reset because of unexpected login times and incorrectly typed credentials. How should the workflow be improved to resolve these issues?


A. Meet with privileged users to increase awareness and modify the rules for threat tags and anomalous behavior alerts


B. Change the SOAR configuration flow to remove the automatic remediation that is increasing the false positives and triggering threats


C. Add a confirmation step through which SOAR informs the affected user and asks them to confirm whether they made the attempts


D. Increase incorrect login tries and tune anomalous user behavior not to affect privileged accounts





C.
  Add a confirmation step through which SOAR informs the affected user and asks them to confirm whether they made the attempts

An API developer is improving an application code to prevent DDoS attacks. The solution needs to accommodate instances of a large number of API requests coming for legitimate purposes from trustworthy services. Which solution should be implemented?


A. Restrict the number of requests based on a calculation of daily averages. If the limit is exceeded, temporarily block access from the IP address and return a 402 HTTP error code.


B. Implement REST API Security Essentials solution to automatically mitigate limit exhaustion. If the limit is exceeded, temporarily block access from the service and return a 409 HTTP error code.


C. Increase a limit of replies in a given interval for each API. If the limit is exceeded, block access from the API key permanently and return a 450 HTTP error code.


D. Apply a limit to the number of requests in a given time interval for each API. If the rate is exceeded, block access from the API key temporarily and return a 429 HTTP error code.





D.
  Apply a limit to the number of requests in a given time interval for each API. If the rate is exceeded, block access from the API key temporarily and return a 429 HTTP error code.

What is a limitation of cyber security risk insurance?


A. It does not cover the costs to restore stolen identities as a result of a cyber attack


B. It does not cover the costs to hire forensics experts to analyze the cyber attack


C. It does not cover the costs of damage done by third parties as a result of a cyber attack


D. It does not cover the costs to hire a public relations company to help deal with a cyber attack





C.
  It does not cover the costs of damage done by third parties as a result of a cyber attack

The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource. What is the next step?


A. Conduct a risk assessment of systems and applications


B. Isolate the infected host from the rest of the subnet


C. Install malware prevention software on the host


D. Analyze network traffic on the host’s subnet





B.
  Isolate the infected host from the rest of the subnet

An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?


A. Analyze environmental threats and causes


B. Inform the product security incident response team to investigate further


C. Analyze the precursors and indicators


D. Inform the computer security incident response team to investigate further





D.
  Inform the computer security incident response team to investigate further

An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default administrator account login. Which step should an engineer take after receiving this alert?


A. Initiate a triage meeting to acknowledge the vulnerability and its potential impact


B. Determine company usage of the affected products


C. Search for a patch to install from the vendor


D. Implement restrictions within the VoIP VLANS





A.
  Initiate a triage meeting to acknowledge the vulnerability and its potential impact

A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?


A. Create a follow-up report based on the incident documentation.


B. Perform a vulnerability assessment to find existing vulnerabilities.


C. Eradicate malicious software from the infected machines.


D. Collect evidence and maintain a chain-of-custody during further analysis.





C.
  Eradicate malicious software from the infected machines.

A security incident affected an organization’s critical business services, and the customerside web API became unresponsive and crashed. An investigation revealed a spike of API call requests and a high number of inactive sessions during the incident. Which two recommendations should the engineers make to prevent similar incidents in the future? (Choose two.)


A. Configure shorter timeout periods.


B. Determine API rate-limiting requirements.


C. Implement API key maintenance.


D. Automate server-side error reporting for customers.


E. Decrease simultaneous API responses.





A.
  Configure shorter timeout periods.

B.
  Determine API rate-limiting requirements.


Page 2 out of 12 Pages
Next
1234
350-201 Practice Test Home

What Makes Our Performing CyberOps Using Core Security Technologies (CBRCOR) Practice Test So Effective?

Real-World Scenario Mastery: Our 350-201 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Performing CyberOps Using Core Security Technologies (CBRCOR) exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 350-201 practice exam questions pool covering all topics, the real exam feels like just another practice session.