ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 10

List of questions

Question 91

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 91 109268 10072024004349000000

What is occurring in this network traffic?

High rate of SYN packets being sent from a multiple source towards a single destination IP.

High rate of SYN packets being sent from a multiple source towards a single destination IP.

High rate of ACK packets being sent from a single source IP towards multiple destination IPs.

High rate of ACK packets being sent from a single source IP towards multiple destination IPs.

Flood of ACK packets coming from a single source IP to multiple destination IPs.

Flood of ACK packets coming from a single source IP to multiple destination IPs.

Flood of SYN packets coming from a single source IP to a single destination IP.

Flood of SYN packets coming from a single source IP to a single destination IP.

Suggested answer: A
Explanation:

The exhibit shows a high rate of SYN packets being sent from multiple sources towards a single destination IP. This is indicative of a SYN flood attack, where the attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 4: Network Intrusion Analysis

asked 07/10/2024
Lionel CHOLEZ
37 questions

Question 92

Report Export Collapse

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

management and reporting

management and reporting

traffic filtering

traffic filtering

adaptive AVC

adaptive AVC

metrics collection and exporting

metrics collection and exporting

application recognition

application recognition

Suggested answer: D, E
Explanation:

Cisco Application Visibility and Control (AVC) provides features like metrics collection and exporting (D) for visibility on TCP bandwidth usage, response time, and latency. Application recognition (E) combined with deep packet inspection helps in identifying unknown software by its network traffic flow.Reference:=Cisco CyberOps Associate - Module 2: Security Concepts

asked 07/10/2024
Sebastian van de Zweerde
49 questions

Question 93

Report Export Collapse

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Hypertext Transfer Protocol

Hypertext Transfer Protocol

SSL Certificate

SSL Certificate

Tunneling

Tunneling

VPN

VPN

Suggested answer: B
Explanation:

SSL Certificate guarantees the integrity and authenticity of all messages transferred to and from a web application. It encrypts the data transferred between the user's browser and the website, ensuring that all data passed between them remains private and integral.Reference:=Cisco CyberOps Engineer - Module 3: Secure Communications

asked 07/10/2024
Mike van den Berg
40 questions

Question 94

Report Export Collapse

An engineer is investigating a case of the unauthorized usage of the ''Tcpdump'' tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

tagged protocols being used on the network

tagged protocols being used on the network

all firewall alerts and resulting mitigations

all firewall alerts and resulting mitigations

tagged ports being used on the network

tagged ports being used on the network

all information and data within the datagram

all information and data within the datagram

Suggested answer: D
Explanation:

The unauthorized usage of ''Tcpdump'' tool indicates that the malicious insider was attempting to obtain all information within datagrams passing through a specific interface on the network. Tcpdump allows users to capture packet data from a live network or read packets from a previously saved capture file.Reference:=Cisco CyberOps - Module 3: Network Data and Event Analysis

asked 07/10/2024
Abdul Majid Pasha
47 questions

Question 95

Report Export Collapse

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

Phishing attack

Phishing attack

Password Revelation Strategy

Password Revelation Strategy

Piggybacking

Piggybacking

Social Engineering

Social Engineering

Suggested answer: D
Explanation:

Social engineering is the practice of manipulating or deceiving people into performing actions or divulging information that can compromise the security of the organization. Asking questions about the company's user account format and password complexity at a party is an example of social engineering, as the guest may be trying to gather information that can be used to launch a cyberattack.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

asked 07/10/2024
tony Gentry
52 questions

Question 96

Report Export Collapse

Which security monitoring data type requires the largest storage space?

transaction data

transaction data

statistical data

statistical data

session data

session data

full packet capture

full packet capture

Suggested answer: D
Explanation:

Full packet capture data involves storing the entire content of packets that traverse a network. This type of data is comprehensive and allows for detailed analysis but requires a significant amount of storage space compared to other data types like transaction, statistical, or session data.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 3: Network Data and Event Analysis

asked 07/10/2024
Alireza Noura
32 questions

Question 97

Report Export Collapse

What are two denial of service attacks? (Choose two.)

MITM

MITM

TCP connections

TCP connections

ping of death

ping of death

UDP flooding

UDP flooding

code red

code red

Suggested answer: C, D
Explanation:

Ping of Death involves sending oversized or malformed pings to crash the target system, while UDP flooding overwhelms the target with UDP packets to consume its resources and disrupt services. These are both examples of denial of service attacks, which aim to prevent legitimate users from accessing a system or service.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 4: Network Intrusion Analysis

asked 07/10/2024
Chad Clark
47 questions

Question 98

Report Export Collapse

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

nmap --top-ports 192.168.1.0/24

nmap --top-ports 192.168.1.0/24

nmap --sP 192.168.1.0/24

nmap --sP 192.168.1.0/24

nmap -sL 192.168.1.0/24

nmap -sL 192.168.1.0/24

nmap -sV 192.168.1.0/24

nmap -sV 192.168.1.0/24

Suggested answer: B
Explanation:

The -sP option in Nmap is used for host discovery without port scanning, which helps in identifying live hosts without triggering portscan alerts on IDS devices. It sends an ICMP echo request, a TCP SYN packet to port 443, a TCP ACK packet to port 80, and an ICMP timestamp request to each target IP address and waits for a response. Any responses are considered as indications of a live host.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 5: Endpoint Threat Analysis and Computer Forensics

asked 07/10/2024
Syed Azar
44 questions

Question 99

Report Export Collapse

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.

Cisco 200-201 image Question 99 109276 10072024004349000000

Which obfuscation technique is the attacker using?

Base64 encoding

Base64 encoding

TLS encryption

TLS encryption

SHA-256 hashing

SHA-256 hashing

ROT13 encryption

ROT13 encryption

Suggested answer: B
asked 07/10/2024
MOHAMED BEN SLIMEN
37 questions

Question 100

Report Export Collapse

A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.

Which type of evidence is this?

best evidence

best evidence

prima facie evidence

prima facie evidence

indirect evidence

indirect evidence

physical evidence

physical evidence

Suggested answer: C
Explanation:

: Indirect evidence is evidence that does not directly prove a fact, but rather implies or infers it from other facts or circumstances. Indirect evidence is also known as circumstantial evidence or corroborating evidence. A video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor is an example of indirect evidence, because it does not directly show that the suspect was involved in the file transfer, but rather suggests a possible connection or correlation between the two events.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 5: Security Policies and Procedures, Lesson 5.3: Digital Forensics, Topic 5.3.1: Evidence, page 5-24.

asked 07/10/2024
Steve Nihan
42 questions
Total 331 questions
Go to page: of 34
Search