Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 8 Question 71 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 71
Topic #: 8
[All 350-201 Questions]

A SIEM tool fires an alert about a VPN connection attempt from an unusual location. The incident response team validates that an attacker has installed a remote access tool on a user's laptop while traveling. The attacker has the user's credentials and is attempting to connect to the network.

What is the next step in handling the incident?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Youlanda
1 months ago
C is the way to go! Gotta catch 'em all, like a cybersecurity Pokemon master!
upvoted 0 times
Clorinda
9 days ago
D) Identify lateral movement
upvoted 0 times
...
Goldie
10 days ago
A) Block the source IP from the firewall
upvoted 0 times
...
Cary
14 days ago
C) Identify systems or services at risk
upvoted 0 times
...
...
Skye
2 months ago
I agree with C. This will help the incident response team understand the full scope of the attack and take appropriate measures to mitigate the risk.
upvoted 0 times
Johnna
19 days ago
C) Identify systems or services at risk
upvoted 0 times
...
Carman
1 months ago
B) Perform an antivirus scan on the laptop
upvoted 0 times
...
Lauran
2 months ago
A) Block the source IP from the firewall
upvoted 0 times
...
...
Alesia
2 months ago
Definitely C. Blocking the source IP is a temporary fix, and an antivirus scan may not catch everything. Identifying the affected systems and potential lateral movement is key to resolving this incident.
upvoted 0 times
Shay
2 days ago
D) Identify lateral movement
upvoted 0 times
...
Glendora
8 days ago
C) Identify systems or services at risk
upvoted 0 times
...
Rodolfo
9 days ago
A) Block the source IP from the firewall
upvoted 0 times
...
Yvonne
13 days ago
D) Identify lateral movement
upvoted 0 times
...
Chantell
18 days ago
C) Identify systems or services at risk
upvoted 0 times
...
Barrett
2 months ago
A) Block the source IP from the firewall
upvoted 0 times
...
...
Dominque
2 months ago
Hmm, I would say C is the next step. Identifying the systems or services at risk is crucial to contain the incident and prevent further damage.
upvoted 0 times
...
Dick
2 months ago
After that, we should block the source IP from the firewall to prevent further access.
upvoted 0 times
...
Mammie
2 months ago
I agree with Laquita, understanding the potential impact is crucial.
upvoted 0 times
...
Laquita
2 months ago
We should identify systems or services at risk first.
upvoted 0 times
...
Franklyn
2 months ago
After that, we can block the source IP from the firewall to prevent further access.
upvoted 0 times
...
Svetlana
3 months ago
I agree with Corazon, we need to know what's at risk before taking any action.
upvoted 0 times
...
Corazon
3 months ago
We should identify systems or services at risk first.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77