exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 42 discussion

Actual exam question from Cisco's 350-201
Question #: 42
Topic #: 1
[All 350-201 Questions]

An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?

  • A. ExecutedMalware.ioc
  • B. Crossrider.ioc
  • C. ConnectToSuspiciousDomain.ioc
  • D. W32.AccesschkUtility.ioc
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CiscoTester
Highly Voted 2 years, 1 month ago
Crossrider is unwanted app and not realted with PS/script interpreters. In AMP4E console IoC list, ExecutedMalware.IoC describes it as malicioud file executed. Answer is A
upvoted 5 times
...
czarul79
Most Recent 2 weeks, 3 days ago
Selected Answer: A
IOC triggered by executing a known malicious file = ExecutedMalware.ioc
upvoted 1 times
...
marceus
4 months, 2 weeks ago
Selected Answer: A
ChatGPT: Since the IOC event is related to a known malicious file being executed, the most fitting indicator would be ExecutedMalware.ioc.
upvoted 1 times
...
jay_c_an
9 months, 3 weeks ago
took the test last week, this is a test question
upvoted 1 times
...
DrVoIP
10 months, 2 weeks ago
Without more information on the IOC event, it is not possible to determine which indicator generated it. However, the fact that a known malicious file has been executed suggests that the ExecutedMalware.ioc may have been triggered. - ChatGPT
upvoted 1 times
...
ETSec
11 months, 2 weeks ago
From the Cisco website; As an example, if the following malicious file is executed, it will be detected as "Cloud IOC ExecutedMalware.ioc". So Answer is A
upvoted 1 times
...
jaciro11
1 year, 4 months ago
Crossrider.ioc Crossrider is a an Adware variant that targets Mac with the intent of displaying ads. It also changes the default home page of Safari and Chrome browsers. W32.AccesschkUtility.ioc Accesscheck is a Windows utility that lets users check for access rights on resources including files, directories, registry keys, global objects and Windows services. This utility could be used by malware or threat actors with malicious intent such as collection of information necessary for privilege escalation on the compromised host. This indicator monitors for accesschk tool used with suspicious options that suppress errors and dialog boxes. ExecutedMalware.ioc A known malicious file was executed. This increases the likelihood of a successful breach and this event should be promptly investigated. Answer is A
upvoted 1 times
...
Bobster02
2 years, 1 month ago
Correct. B.
upvoted 1 times
...
J_Dub
2 years, 3 months ago
I believe B is correct since Crossrider is malware. This malware is part of the Adware family.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...