exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 28 discussion

Actual exam question from Cisco's 350-201
Question #: 28
Topic #: 1
[All 350-201 Questions]

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company's infrastructure. Which steps should an engineer take at the recovery stage?

  • A. Determine the systems involved and deploy available patches
  • B. Analyze event logs and restrict network access
  • C. Review access lists and require users to increase password complexity
  • D. Identify the attack vector and update the IDS signature list
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
danny069
Highly Voted 3 years, 9 months ago
Guys I took the exam and failed today. All the questions are here but the answers are wrong.
upvoted 13 times
...
marceus
Most Recent 2 months, 3 weeks ago
Selected Answer: A
ChatGPT: During the recovery stage of the incident response process, the focus is on restoring affected systems to a secure state and preventing reinfection.
upvoted 2 times
...
27ea763
3 months, 1 week ago
Selected Answer: A
I would go with A
upvoted 1 times
...
TrainingTeam
6 months, 4 weeks ago
Selected Answer: A
correct answer is A 100%
upvoted 1 times
...
shilp21
1 year, 6 months ago
Since it is at recovery stage. correct Answer is A
upvoted 1 times
...
jay_c_an
2 years, 2 months ago
similar test question except the action required to prevent
upvoted 1 times
...
DrVoIP
2 years, 2 months ago
At the recovery stage of an incident where a remote code execution attack has occurred in a company's infrastructure after a phishing email was used to deliver a file with an embedded macro, the following step should be taken: A. Determine the systems involved and deploy available patches. After an incident, it is essential to determine the scope of the attack, including which systems were involved and the extent of the damage. In this case, the first step in the recovery process should be to identify the affected systems and deploy available patches to prevent the attack from recurring and to address any vulnerabilities that were exploited. Other answers also important steps in responding to the incident, but they are not specific to the recovery stage. These steps can be taken earlier in the incident response process to help identify and contain the attack, but at the recovery stage, the focus is on restoring affected systems and preventing the attack from recurring. - ChatGPT
upvoted 1 times
...
Medjai89
2 years, 4 months ago
A - Recovery
upvoted 1 times
...
TOLU1985
2 years, 7 months ago
Selected Answer: A
We talk about recovery. Correct answer is A.
upvoted 1 times
...
kyle942
2 years, 7 months ago
Selected Answer: D
The most common attack vectors include malware, viruses, email attachments, web pages, pop-ups, instant messages, text messages, and social engineering. However, the number of cyber threats continues to grow as cybercriminals look to exploit unpatched or zero-day vulnerabilities listed on CVE and the dark web, as there is no single solution for preventing every attack vector.
upvoted 1 times
...
Bobster02
3 years, 6 months ago
A -100%.
upvoted 4 times
...
danny069
3 years, 9 months ago
So for this question we need to know what happens in the NIST "recovery" stage: In recovery, administrators restore systems to normal operation, confirm that the systems are functioning normally, and (if applicable) remediate vulnerabilities to prevent similar incidents. Recovery may involve such actions as restoring systems from clean backups, rebuilding systems from scratch, replacing compromised files with clean versions, installing patches, changing passwords, and tightening network perimeter security (e.g., firewall rulesets, boundary router access control lists). Although the answer seen here is B, I also believe the answer is A.
upvoted 1 times
...
kou
3 years, 9 months ago
I think A is the correct answer.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago