ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

What is occurring in this network traffic?

A.

High rate of SYN packets being sent from a multiple source towards a single destination IP.

A.

High rate of SYN packets being sent from a multiple source towards a single destination IP.

Answers
B.

High rate of ACK packets being sent from a single source IP towards multiple destination IPs.

B.

High rate of ACK packets being sent from a single source IP towards multiple destination IPs.

Answers
C.

Flood of ACK packets coming from a single source IP to multiple destination IPs.

C.

Flood of ACK packets coming from a single source IP to multiple destination IPs.

Answers
D.

Flood of SYN packets coming from a single source IP to a single destination IP.

D.

Flood of SYN packets coming from a single source IP to a single destination IP.

Answers
Suggested answer: A

Explanation:

The exhibit shows a high rate of SYN packets being sent from multiple sources towards a single destination IP. This is indicative of a SYN flood attack, where the attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 4: Network Intrusion Analysis

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

A.

management and reporting

A.

management and reporting

Answers
B.

traffic filtering

B.

traffic filtering

Answers
C.

adaptive AVC

C.

adaptive AVC

Answers
D.

metrics collection and exporting

D.

metrics collection and exporting

Answers
E.

application recognition

E.

application recognition

Answers
Suggested answer: D, E

Explanation:

Cisco Application Visibility and Control (AVC) provides features like metrics collection and exporting (D) for visibility on TCP bandwidth usage, response time, and latency. Application recognition (E) combined with deep packet inspection helps in identifying unknown software by its network traffic flow.Reference:=Cisco CyberOps Associate - Module 2: Security Concepts

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

A.

Hypertext Transfer Protocol

A.

Hypertext Transfer Protocol

Answers
B.

SSL Certificate

B.

SSL Certificate

Answers
C.

Tunneling

C.

Tunneling

Answers
D.

VPN

D.

VPN

Answers
Suggested answer: B

Explanation:

SSL Certificate guarantees the integrity and authenticity of all messages transferred to and from a web application. It encrypts the data transferred between the user's browser and the website, ensuring that all data passed between them remains private and integral.Reference:=Cisco CyberOps Engineer - Module 3: Secure Communications

An engineer is investigating a case of the unauthorized usage of the ''Tcpdump'' tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

A.

tagged protocols being used on the network

A.

tagged protocols being used on the network

Answers
B.

all firewall alerts and resulting mitigations

B.

all firewall alerts and resulting mitigations

Answers
C.

tagged ports being used on the network

C.

tagged ports being used on the network

Answers
D.

all information and data within the datagram

D.

all information and data within the datagram

Answers
Suggested answer: D

Explanation:

The unauthorized usage of ''Tcpdump'' tool indicates that the malicious insider was attempting to obtain all information within datagrams passing through a specific interface on the network. Tcpdump allows users to capture packet data from a live network or read packets from a previously saved capture file.Reference:=Cisco CyberOps - Module 3: Network Data and Event Analysis

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

A.

Phishing attack

A.

Phishing attack

Answers
B.

Password Revelation Strategy

B.

Password Revelation Strategy

Answers
C.

Piggybacking

C.

Piggybacking

Answers
D.

Social Engineering

D.

Social Engineering

Answers
Suggested answer: D

Explanation:

Social engineering is the practice of manipulating or deceiving people into performing actions or divulging information that can compromise the security of the organization. Asking questions about the company's user account format and password complexity at a party is an example of social engineering, as the guest may be trying to gather information that can be used to launch a cyberattack.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

Which security monitoring data type requires the largest storage space?

A.

transaction data

A.

transaction data

Answers
B.

statistical data

B.

statistical data

Answers
C.

session data

C.

session data

Answers
D.

full packet capture

D.

full packet capture

Answers
Suggested answer: D

Explanation:

Full packet capture data involves storing the entire content of packets that traverse a network. This type of data is comprehensive and allows for detailed analysis but requires a significant amount of storage space compared to other data types like transaction, statistical, or session data.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 3: Network Data and Event Analysis

What are two denial of service attacks? (Choose two.)

A.

MITM

A.

MITM

Answers
B.

TCP connections

B.

TCP connections

Answers
C.

ping of death

C.

ping of death

Answers
D.

UDP flooding

D.

UDP flooding

Answers
E.

code red

E.

code red

Answers
Suggested answer: C, D

Explanation:

Ping of Death involves sending oversized or malformed pings to crash the target system, while UDP flooding overwhelms the target with UDP packets to consume its resources and disrupt services. These are both examples of denial of service attacks, which aim to prevent legitimate users from accessing a system or service.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 4: Network Intrusion Analysis

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

A.

nmap --top-ports 192.168.1.0/24

A.

nmap --top-ports 192.168.1.0/24

Answers
B.

nmap --sP 192.168.1.0/24

B.

nmap --sP 192.168.1.0/24

Answers
C.

nmap -sL 192.168.1.0/24

C.

nmap -sL 192.168.1.0/24

Answers
D.

nmap -sV 192.168.1.0/24

D.

nmap -sV 192.168.1.0/24

Answers
Suggested answer: B

Explanation:

The -sP option in Nmap is used for host discovery without port scanning, which helps in identifying live hosts without triggering portscan alerts on IDS devices. It sends an ICMP echo request, a TCP SYN packet to port 443, a TCP ACK packet to port 80, and an ICMP timestamp request to each target IP address and waits for a response. Any responses are considered as indications of a live host.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 5: Endpoint Threat Analysis and Computer Forensics

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.

Which obfuscation technique is the attacker using?

A.

Base64 encoding

A.

Base64 encoding

Answers
B.

TLS encryption

B.

TLS encryption

Answers
C.

SHA-256 hashing

C.

SHA-256 hashing

Answers
D.

ROT13 encryption

D.

ROT13 encryption

Answers
Suggested answer: B

A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.

Which type of evidence is this?

A.

best evidence

A.

best evidence

Answers
B.

prima facie evidence

B.

prima facie evidence

Answers
C.

indirect evidence

C.

indirect evidence

Answers
D.

physical evidence

D.

physical evidence

Answers
Suggested answer: C

Explanation:

: Indirect evidence is evidence that does not directly prove a fact, but rather implies or infers it from other facts or circumstances. Indirect evidence is also known as circumstantial evidence or corroborating evidence. A video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor is an example of indirect evidence, because it does not directly show that the suspect was involved in the file transfer, but rather suggests a possible connection or correlation between the two events.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 5: Security Policies and Procedures, Lesson 5.3: Digital Forensics, Topic 5.3.1: Evidence, page 5-24.

Total 331 questions
Go to page: of 34