Free 350-201 Practice Test Questions 2026

139 Questions


Last Updated On : 20-May-2026


A cloud engineer needs a solution to deploy applications on a cloud without being able to manage and control the server OS. Which type of cloud environment should be used?


A. IaaS


B. PaaS


C. DaaS


D. SaaS





B.
  PaaS

A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled “Invoice RE: 0004489”. The hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?


A. Run and analyze the DLP Incident Summary Report from the Email Security Appliance


B. Ask the company to execute the payload for real time analysis


C. Investigate further in open source repositories using YARA to find matches


D. Obtain a copy of the file for detonation in a sandbox





D.
  Obtain a copy of the file for detonation in a sandbox

An engineer is developing an application that requires frequent updates to close feedback loops and enable teams to quickly apply patches. The team wants their code updates to get to market as often as possible. Which software development approach should be used to accomplish these goals?


A. continuous delivery


B. continuous integration


C. continuous deployment


D. continuous monitoring





A.
  continuous delivery

The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?


A. eradication and recovery


B. post-incident activity


C. containment


D. detection and analysis





A.
  eradication and recovery

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)


A. Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.


B. Identify who installed the application by reviewing the logs and gather a user access log from the HR department.


C. Verify user credentials on the affected asset, modify passwords, and confirm available patches and updates are installed.


D. Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.





A.
  Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.

B.
  Identify who installed the application by reviewing the logs and gather a user access log from the HR department.

A SOC team is investigating a recent, targeted social engineering attack on multiple employees. Cross- correlated log analysis revealed that two hours before the attack, multiple assets received requests on TCP port 79. Which action should be taken by the SOC team to mitigate this attack?


A. Disable BIND forwarding from the DNS server to avoid reconnaissance.


B. Disable affected assets and isolate them for further investigation.


C. Configure affected devices to disable NETRJS protocol.


D. Configure affected devices to disable the Finger service.





D.
  Configure affected devices to disable the Finger service.

What do 2xx HTTP response codes indicate for REST APIs?


A. additional action must be taken by the client to complete the request


B. the server takes responsibility for error status codes


C. communication of transfer protocol-level information


D. successful acceptance of the client’s request





D.
  successful acceptance of the client’s request

The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?


A. Contain the malware


B. Install IPS software


C. Determine the escalation path


D. Perform vulnerability assessment





A.
  Contain the malware

A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices. Which technical architecture must be used?


A. DLP for data in motion


B. DLP for removable data


C. DLP for data in use


D. DLP for data at rest





C.
  DLP for data in use

What is idempotence?


A. the assurance of system uniformity throughout the whole delivery process


B. the ability to recover from failures while keeping critical services running


C. the necessity of setting maintenance of individual deployment environments


D. the ability to set the target environment configuration regardless of the starting state





D.
  the ability to set the target environment configuration regardless of the starting state

An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?


A. aligning access control policies


B. exfiltration during data transfer


C. attack using default accounts


D. data exposure from backups





C.
  attack using default accounts

A security engineer discovers that a spreadsheet containing confidential information for nine of their employees was fraudulently posted on a competitor’s website. The spreadsheet contains names, salaries, and social security numbers. What is the next step the engineer should take in this investigation?


A. Determine if there is internal knowledge of this incident


B. Check incoming and outgoing communications to identify spoofed emails.


C. Disconnect the network from Internet access to stop the phishing threats and regain control.


D. Engage the legal department to explore action against the competitor that posted the spreadsheet.





A.
  Determine if there is internal knowledge of this incident


Page 3 out of 12 Pages
PreviousNext
1234
350-201 Practice Test Home

What Makes Our Performing CyberOps Using Core Security Technologies (CBRCOR) Practice Test So Effective?

Real-World Scenario Mastery: Our 350-201 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Performing CyberOps Using Core Security Technologies (CBRCOR) exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 350-201 practice exam questions pool covering all topics, the real exam feels like just another practice session.