350-201 Exam Question 46

Drag and drop the function on the left onto the mechanism on the right.

350-201 Exam Question 47

An analyst is alerted for a malicious file hash. After analysis, the analyst determined that an internal workstation is communicating over port 80 with an external server and that the file hash is associated with Duqu malware. Which tactics, techniques, and procedures align with this analysis?
  • 350-201 Exam Question 48

    Refer to the exhibit.

    An engineer notices a significant anomaly in the traffic in one of the host groups in Cisco Secure Network Analytics (Stealthwatch) and must analyze the top data transmissions. Which tool accomplishes this task?
  • 350-201 Exam Question 49

    Refer to the exhibit.

    A threat actor behind a single computer exploited a cloud-based application by sending multiple concurrent API requests. These requests made the application unresponsive. Which solution protects the application from being overloaded and ensures more equitable application access across the end-user community?
  • 350-201 Exam Question 50

    Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.