Cisco 200-201 Practice Test - Questions Answers, Page 14
List of questions
Question 131

Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?
Modify the settings of the intrusion detection system.
Design criteria for reviewing alerts.
Redefine signature rules.
Adjust the alerts schedule.
When a system is overwhelmed with alerts, designing criteria for reviewing alerts can help prioritize and manage them more effectively.This approach allows for a structured review process that can distinguish between false positives, false negatives, and legitimate alerts, reducing the overall number of alerts that require attention3.
Question 132

What is the impact of false positive alerts on business compared to true positive?
True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.
True positive alerts are blocked by mistake as potential attacks affecting application availability.
False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.
False positive alerts are blocked by mistake as potential attacks affecting application availability.
The log in the exhibit is generated by a firewall. It shows a deny action taken on TCP traffic, specifying the source and destination addresses and ports, which is characteristic of firewall logs. Firewalls are designed to control incoming and outgoing network traffic based on predetermined security rules, and this log entry reflects the enforcement of such a rule.
Cisco's official documentation on firewall technologies and their log formats.
Question 133

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?
Firepower
Email Security Appliance
Web Security Appliance
Stealthwatch
Stealthwatch is the technology that an engineer should use to fetch logs from a proxy server and generate actual events based on the data received. Cisco Secure Network Analytics, formerly known as Stealthwatch, provides the capability to configure proxy server logs so that the Flow Collector can receive the information.The Stealthwatch Management Console then displays this information on the Flow Proxy Records page, which includes URLs and application names of the traffic inside a network going through the proxy server1.
Cisco Secure Network Analytics Proxy Log Configuration Guide
Question 134

Refer to the exhibit.
Which technology generates this log?
NetFlow
IDS
web proxy
firewall
The log in the exhibit is generated by a firewall. It shows a deny action taken on TCP traffic, specifying the source and destination addresses and ports, which is characteristic of firewall logs. Firewalls are designed to control incoming and outgoing network traffic based on predetermined security rules, and this log entry reflects the enforcement of such a rule.
Cisco's official documentation on firewall technologies and their log formats.
Question 135

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
src=10.11.0.0/16 and dst=10.11.0.0/16
ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16
ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16
src==10.11.0.0/16 and dst==10.11.0.0/16
In Wireshark, to filter traffic for a specific LAN, the correct syntax usesip.src==andip.dst==to specify the source and destination IP addresses. The/16denotes the subnet mask, indicating that we are interested in the entire 10.11.x.x range.This filter will show all traffic where both the source and destination IP addresses fall within the specified LAN, excluding any internet traffic.Reference:: The information is based on the Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course, which covers network intrusion analysis and the use of tools like Wireshark for traffic analysis1.
Question 136

Which tool provides a full packet capture from network traffic?
Nagios
CAINE
Hydra
Wireshark
Wireshark is a widely-used network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network.It provides full packet capture capabilities, enabling detailed analysis of network traffic.Reference:: This is supported by the CBROPS course materials, which discuss security monitoring and the analysis of network traffic, including full packet capture tools like Wireshark
Question 137

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?
total throughput on the interface of the router and NetFlow records
output of routing protocol authentication failures and ports used
running processes on the applications and their total network usage
deep packet captures of each application flow and duration
For high availability and responsiveness, especially where milliseconds of latency are critical, an engineer must analyze the network's performance in detail. Total throughput on the interface of the router will provide information on the bandwidth and traffic load, which is essential for understanding if the network can handle the current and projected traffic without delays. NetFlow records are crucial for this analysis as they provide data about the traffic flow across the network, which helps in identifying patterns, peak usage times, and types of traffic.This information is vital for making informed decisions to optimize traffic movement and minimize latency123.
Cisco's guide on Network Traffic Analysis1.
Cisco's white paper on Network Security Policy: Best Practices2.
Cisco's documentation on Implementation of High Availability
Question 138

Refer to the exhibit.
What is depicted in the exhibit?
Windows Event logs
Apache logs
IIS logs
UNIX-based syslog
The exhibit shows a UNIX command being used to filter data from an Apache access log file. The use of ''cat'' to display the content of the log file, ''grep'' to filter specific IP addresses, and ''cut'' to organize the output are all indicative of operations performed on a UNIX-based system. Additionally, the structure of the logs (GET requests) aligns with the format typically found in Apache server logs.Reference:= The Cisco Cybersecurity source documents or study guide are not directly referenced here as I need to search for specific content related to this question.
Question 139

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?
AWS
IIS
Load balancer
Proxy server
A load balancer is the correct technology to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier (URI), and SSL session ID attributes.Load balancers can inspect incoming traffic and make routing decisions to distribute the traffic across multiple servers based on various attributes, including the ones mentioned, to ensure optimal resource use and efficient traffic management12.
Cisco Unified Border Element Configuration Guide1.
URI based outbound Dial-peer configuration on CUBE - Cisco Community
Question 140

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.
What is the initial event called in the NIST SP800-61?
online assault
precursor
trigger
instigator
In the context of NIST SP800-61, a precursor is an event that indicates the potential occurrence of an incident. When an organization adjusts its security stance in response to online threats made by a known hacktivist group, the initial event---the threats---would be considered a precursor.It is an indication of a potential future attack or security incident34.
NIST SP 800-61 Rev.2, Computer Security Incident Handling Guide3.
Computer Security Incident Handling Guide - NIST
Question