Free 350-201 Practice Test Questions 2026

139 Questions


Last Updated On : 20-May-2026


What is needed to assess risk mitigation effectiveness in an organization?


A. analysis of key performance indicators


B. compliance with security standards


C. cost-effectiveness of control measures


D. updated list of vulnerable systems





A.
  analysis of key performance indicators

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company’s infrastructure. Which steps should an engineer take at the recovery stage?


A. Determine the systems involved and deploy available patches


B. Analyze event logs and restrict network access


C. Review access lists and require users to increase password complexity


D. Identify the attack vector and update the IDS signature list





A.
  Determine the systems involved and deploy available patches

A threat actor attacked an organization’s Active Directory server from a remote location, and in a thirty-minute timeframe, stole the password for the administrator account and attempted to access 3 company servers. The threat actor successfully accessed the first server that contained sales data, but no files were downloaded. A second server was also accessed that contained marketing information and 11 files were downloaded. When the threat actor accessed the third server that contained corporate financial data, the session was disconnected, and the administrator’s account was disabled. Which activity triggered the behavior analytics tool?


A. accessing the Active Directory server


B. accessing the server with financial data


C. accessing multiple servers


D. downloading more than 10 files





D.
  downloading more than 10 files

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?


A. Disable memory limit.


B. Disable CPU threshold trap toward the SNMP server.


C. Enable memory tracing notifications


D. Enable memory threshold notifications.





D.
  Enable memory threshold notifications.

An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?


A. ExecutedMalware.ioc


B. Crossrider.ioc


C. ConnectToSuspiciousDomain.ioc


D. W32 AccesschkUtility.ioc





A.
  ExecutedMalware.ioc

A company’s web server availability was breached by a DDoS attack and was offline for 3 hours because it was not deemed a critical asset in the incident response playbook. Leadership has requested a risk assessment of the asset. An analyst conducted the risk assessment using the threat sources, events, and vulnerabilities. Which additional element is needed to calculate the risk?


A. assessment scope


B. event severity and likelihood


C. incident response playbook


D. risk model framework





B.
  event severity and likelihood

A patient views information that is not theirs when they sign in to the hospital’s online portal. The patient calls the support center at the hospital but continues to be put on hold because other patients are experiencing the same issue. An incident has been declared, and an engineer is now on the incident bridge as the CyberOps Tier 3 Analyst. There is a concern about the disclosure of PII occurring in real-time. What is the first step the analyst should take to address this incident?


A. Evaluate visibility tools to determine if external access resulted in tampering


B. Contact the third-party handling provider to respond to the incident as critical


C. Turn off all access to the patient portal to secure patient records


D. Review system and application logs to identify errors in the portal code





D.
  Review system and application logs to identify errors in the portal code

A payroll administrator noticed unexpected changes within a piece of software and reported the incident to the incident response team. Which actions should be taken at this step in the incident response workflow?


A. Classify the criticality of the information, research the attacker’s motives, and identify missing patches


B. Determine the damage to the business, extract reports, and save evidence according to a chain of custody


C. Classify the attack vector, understand the scope of the event, and identify the vulnerabilities being exploited


D. Determine the attack surface, evaluate the risks involved, and communicate the incident according to the escalation plan





C.
  Classify the attack vector, understand the scope of the event, and identify the vulnerabilities being exploited

What is a benefit of key risk indicators?


A. clear perspective into the risk position of an organization


B. improved visibility on quantifiable information


C. improved mitigation techniques for unknown threats


D. clear procedures and processes for organizational risk





A.
  clear perspective into the risk position of an organization

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?


A. Allow list only authorized hosts to contact the application’s IP at a specific port.


B. Allow list HTTP traffic through the corporate VLANS.


C. Allow list traffic to application’s IP from the internal network at a specific port.


D. Allow list only authorized hosts to contact the application’s VLAN.





A.
  Allow list only authorized hosts to contact the application’s IP at a specific port.

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads. Which standard must the company follow to safeguard the resting data?


A. HIPAA


B. PCI-DSS


C. Sarbanes-Oxley


D. GDPR





D.
  GDPR

An engineer detects an intrusion event inside an organization’s network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?


A. Disconnect the affected server from the network


B. Analyze the source


C. Access the affected server to confirm compromised files are encrypted


D. Determine the attack surface





A.
  Disconnect the affected server from the network


Page 4 out of 12 Pages
PreviousNext
2345
350-201 Practice Test Home

What Makes Our Performing CyberOps Using Core Security Technologies (CBRCOR) Practice Test So Effective?

Real-World Scenario Mastery: Our 350-201 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Performing CyberOps Using Core Security Technologies (CBRCOR) exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 350-201 practice exam questions pool covering all topics, the real exam feels like just another practice session.