Cisco 200-201 Practice Test - Questions Answers, Page 12
List of questions
Question 111

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?
The computer has a HIPS installed on it.
The computer has a NIPS installed on it.
The computer has a HIDS installed on it.
The computer has a NIDS installed on it.
The discrepancy described suggests that the system had aHost Intrusion Detection System (HIDS)installed. HIDS are designed to monitor and analyze the internals of a computing system for signs of intrusion and policy violations. While they can detect unauthorized activities, they do not take direct action to stop an attack; this is typically the role of an intrusion prevention system. Therefore, the alert was generated, but no mitigation action was taken because the HIDS does not have the capability to intervene.
Question 112

Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
A policy violation is active for host 10.10.101.24.
A host on the network is sending a DDoS attack to another inside host.
There are three active data exfiltration alerts.
A policy violation is active for host 10.201.3.149.
The Stealthwatch dashboard indicates that there is an active policy violation associated with host 10.201.3.149. Stealthwatch is a security analytics tool that uses network telemetry to detect and respond to threats. In this case, the dashboard has flagged a policy violation, which means that activity from this host has been detected that goes against the defined security policies, potentially indicating a security threat or unauthorized access.
Question 113

What is a difference between tampered and untampered disk images?
Tampered images have the same stored and computed hash.
Untampered images are deliberately altered to preserve as evidence.
Tampered images are used as evidence.
Untampered images are used for forensic investigations.
The difference between tampered and untampered disk images is:
Tampered Images: These are disk images that have beenaltered or modifiedin some way after their initial creation. The stored hash and the computed hash willnot matchif the image has been tampered with.
Untampered Images: These are disk images that havenot been alteredsince their creation. They are consideredauthenticand reliable for forensic investigations. The stored hash and the computed hash willmatch, confirming that the image has remained unchanged.
Therefore, the correct answer is: D. Untampered images are used for forensic investigations.
Question 114

What is a sandbox interprocess communication service?
A collection of rules within the sandbox that prevent the communication between sandboxes.
A collection of network services that are activated on an interface, allowing for inter-port communication.
A collection of interfaces that allow for coordination of activities among processes.
A collection of host services that allow for communication between sandboxes.
A sandbox interprocess communication service refers to the mechanisms that allow different processes within a sandboxed environment to communicate with each other. These interfaces are crucial for coordinating activities among processes, especially in a restricted environment like a sandbox where direct interaction with the operating system or other processes might be limited for security reasons. This communication is essential for complex applications that require different processes to work together to perform tasks.
Question 115

Which regular expression matches 'color' and 'colour'?
colo?ur
col[08]+our
colou?r
col[09]+our
The regular expression that matches both ''color'' and ''colour'' iscolo?ur. In this expression, the?denotes that the preceding characteruis optional, meaning it may appear zero or one time. This allows the expression to match both the American spelling ''color'' and the British spelling ''colour''.
Question 116

Which artifact is used to uniquely identify a detected file?
file timestamp
file extension
file size
file hash
A file hash is a unique identifier that is used to detect a specific file. It is generated by running a file through a cryptographic hash function, which produces a string of characters that represents the contents of the file. If even a single bit in the file changes, the resulting hash will be different, making it an effective way to identify files uniquely.
Question 117

A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?
application whitelisting/blacklisting
network NGFW
host-based IDS
antivirus/antispyware software
Application whitelisting/blacklisting is a technology used to control which applications are allowed to execute on a company's corporate PCs. Whitelisting allows only approved applications to run, while blacklisting prevents specific applications from running. This approach is effective for managing application usage across an enterprise.
Question 118

Which utility blocks a host portscan?
HIDS
sandboxing
host-based firewall
antimalware
A host-based firewall is a utility that can block unauthorized access to a computer system, including port scans. It monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
Question 119

An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?
true negative
false negative
false positive
true positive
A false negative occurs when an intrusion detection system (IDS) fails to detect and report actual malicious activity. This means that a legitimate security alert has been dismissed or overlooked, allowing potentially harmful traffic to pass through the network undetected.The impact of false negatives can be significant as they represent missed opportunities to stop or mitigate security threats1.
Question 120

Which signature impacts network traffic by causing legitimate traffic to be blocked?
false negative
true positive
true negative
false positive
A false positive in network security is when a benign action is incorrectly flagged as malicious, leading to legitimate traffic being blocked.This can disrupt normal network operations and access to services, as the security system mistakenly identifies normal behavior as a threat1.
Question