Cisco 200-201 Practice Test - Questions Answers, Page 10
List of questions
Question 91

Refer to the exhibit.
What is occurring in this network traffic?
High rate of SYN packets being sent from a multiple source towards a single destination IP.
High rate of ACK packets being sent from a single source IP towards multiple destination IPs.
Flood of ACK packets coming from a single source IP to multiple destination IPs.
Flood of SYN packets coming from a single source IP to a single destination IP.
The exhibit shows a high rate of SYN packets being sent from multiple sources towards a single destination IP. This is indicative of a SYN flood attack, where the attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 4: Network Intrusion Analysis
Question 92

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)
management and reporting
traffic filtering
adaptive AVC
metrics collection and exporting
application recognition
Cisco Application Visibility and Control (AVC) provides features like metrics collection and exporting (D) for visibility on TCP bandwidth usage, response time, and latency. Application recognition (E) combined with deep packet inspection helps in identifying unknown software by its network traffic flow.Reference:=Cisco CyberOps Associate - Module 2: Security Concepts
Question 93

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?
Hypertext Transfer Protocol
SSL Certificate
Tunneling
VPN
SSL Certificate guarantees the integrity and authenticity of all messages transferred to and from a web application. It encrypts the data transferred between the user's browser and the website, ensuring that all data passed between them remains private and integral.Reference:=Cisco CyberOps Engineer - Module 3: Secure Communications
Question 94

An engineer is investigating a case of the unauthorized usage of the ''Tcpdump'' tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?
tagged protocols being used on the network
all firewall alerts and resulting mitigations
tagged ports being used on the network
all information and data within the datagram
The unauthorized usage of ''Tcpdump'' tool indicates that the malicious insider was attempting to obtain all information within datagrams passing through a specific interface on the network. Tcpdump allows users to capture packet data from a live network or read packets from a previously saved capture file.Reference:=Cisco CyberOps - Module 3: Network Data and Event Analysis
Question 95

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?
Phishing attack
Password Revelation Strategy
Piggybacking
Social Engineering
Social engineering is the practice of manipulating or deceiving people into performing actions or divulging information that can compromise the security of the organization. Asking questions about the company's user account format and password complexity at a party is an example of social engineering, as the guest may be trying to gather information that can be used to launch a cyberattack.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations
Question 96

Which security monitoring data type requires the largest storage space?
transaction data
statistical data
session data
full packet capture
Full packet capture data involves storing the entire content of packets that traverse a network. This type of data is comprehensive and allows for detailed analysis but requires a significant amount of storage space compared to other data types like transaction, statistical, or session data.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 3: Network Data and Event Analysis
Question 97

What are two denial of service attacks? (Choose two.)
MITM
TCP connections
ping of death
UDP flooding
code red
Ping of Death involves sending oversized or malformed pings to crash the target system, while UDP flooding overwhelms the target with UDP packets to consume its resources and disrupt services. These are both examples of denial of service attacks, which aim to prevent legitimate users from accessing a system or service.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 4: Network Intrusion Analysis
Question 98

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
nmap --top-ports 192.168.1.0/24
nmap --sP 192.168.1.0/24
nmap -sL 192.168.1.0/24
nmap -sV 192.168.1.0/24
The -sP option in Nmap is used for host discovery without port scanning, which helps in identifying live hosts without triggering portscan alerts on IDS devices. It sends an ICMP echo request, a TCP SYN packet to port 443, a TCP ACK packet to port 80, and an ICMP timestamp request to each target IP address and waits for a response. Any responses are considered as indications of a live host.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 5: Endpoint Threat Analysis and Computer Forensics
Question 99

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
Base64 encoding
TLS encryption
SHA-256 hashing
ROT13 encryption
Question 100

A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?
best evidence
prima facie evidence
indirect evidence
physical evidence
: Indirect evidence is evidence that does not directly prove a fact, but rather implies or infers it from other facts or circumstances. Indirect evidence is also known as circumstantial evidence or corroborating evidence. A video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor is an example of indirect evidence, because it does not directly show that the suspect was involved in the file transfer, but rather suggests a possible connection or correlation between the two events.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 5: Security Policies and Procedures, Lesson 5.3: Digital Forensics, Topic 5.3.1: Evidence, page 5-24.
Question