ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report Export Collapse

Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?

Modify the settings of the intrusion detection system.

Modify the settings of the intrusion detection system.

Design criteria for reviewing alerts.

Design criteria for reviewing alerts.

Redefine signature rules.

Redefine signature rules.

Adjust the alerts schedule.

Adjust the alerts schedule.

Suggested answer: B
Explanation:

When a system is overwhelmed with alerts, designing criteria for reviewing alerts can help prioritize and manage them more effectively.This approach allows for a structured review process that can distinguish between false positives, false negatives, and legitimate alerts, reducing the overall number of alerts that require attention3.

asked 07/10/2024
Roberto Pili
34 questions

Question 132

Report Export Collapse

What is the impact of false positive alerts on business compared to true positive?

True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

True positive alerts are blocked by mistake as potential attacks affecting application availability.

True positive alerts are blocked by mistake as potential attacks affecting application availability.

False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

False positive alerts are blocked by mistake as potential attacks affecting application availability.

False positive alerts are blocked by mistake as potential attacks affecting application availability.

Suggested answer: D
Explanation:

The log in the exhibit is generated by a firewall. It shows a deny action taken on TCP traffic, specifying the source and destination addresses and ports, which is characteristic of firewall logs. Firewalls are designed to control incoming and outgoing network traffic based on predetermined security rules, and this log entry reflects the enforcement of such a rule.

Cisco's official documentation on firewall technologies and their log formats.

asked 07/10/2024
Andifon Etim
42 questions

Question 133

Report Export Collapse

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

Firepower

Firepower

Email Security Appliance

Email Security Appliance

Web Security Appliance

Web Security Appliance

Stealthwatch

Stealthwatch

Suggested answer: D
Explanation:

Stealthwatch is the technology that an engineer should use to fetch logs from a proxy server and generate actual events based on the data received. Cisco Secure Network Analytics, formerly known as Stealthwatch, provides the capability to configure proxy server logs so that the Flow Collector can receive the information.The Stealthwatch Management Console then displays this information on the Flow Proxy Records page, which includes URLs and application names of the traffic inside a network going through the proxy server1.

Cisco Secure Network Analytics Proxy Log Configuration Guide

asked 07/10/2024
Jason Potter
52 questions

Question 134

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 134 109311 10072024004349000000

Which technology generates this log?

NetFlow

NetFlow

IDS

IDS

web proxy

web proxy

firewall

firewall

Suggested answer: D
Explanation:

The log in the exhibit is generated by a firewall. It shows a deny action taken on TCP traffic, specifying the source and destination addresses and ports, which is characteristic of firewall logs. Firewalls are designed to control incoming and outgoing network traffic based on predetermined security rules, and this log entry reflects the enforcement of such a rule.

Cisco's official documentation on firewall technologies and their log formats.

asked 07/10/2024
Deepak PSK
51 questions

Question 135

Report Export Collapse

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?

src=10.11.0.0/16 and dst=10.11.0.0/16

src=10.11.0.0/16 and dst=10.11.0.0/16

ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16

ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16

ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16

ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16

src==10.11.0.0/16 and dst==10.11.0.0/16

src==10.11.0.0/16 and dst==10.11.0.0/16

Suggested answer: B
Explanation:

In Wireshark, to filter traffic for a specific LAN, the correct syntax usesip.src==andip.dst==to specify the source and destination IP addresses. The/16denotes the subnet mask, indicating that we are interested in the entire 10.11.x.x range.This filter will show all traffic where both the source and destination IP addresses fall within the specified LAN, excluding any internet traffic.Reference:: The information is based on the Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course, which covers network intrusion analysis and the use of tools like Wireshark for traffic analysis1.

asked 07/10/2024
David Powell
33 questions

Question 136

Report Export Collapse

Which tool provides a full packet capture from network traffic?

Nagios

Nagios

CAINE

CAINE

Hydra

Hydra

Wireshark

Wireshark

Suggested answer: D
Explanation:

Wireshark is a widely-used network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network.It provides full packet capture capabilities, enabling detailed analysis of network traffic.Reference:: This is supported by the CBROPS course materials, which discuss security monitoring and the analysis of network traffic, including full packet capture tools like Wireshark

asked 07/10/2024
Unai M
45 questions

Question 137

Report Export Collapse

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?

total throughput on the interface of the router and NetFlow records

total throughput on the interface of the router and NetFlow records

output of routing protocol authentication failures and ports used

output of routing protocol authentication failures and ports used

running processes on the applications and their total network usage

running processes on the applications and their total network usage

deep packet captures of each application flow and duration

deep packet captures of each application flow and duration

Suggested answer: A
Explanation:

For high availability and responsiveness, especially where milliseconds of latency are critical, an engineer must analyze the network's performance in detail. Total throughput on the interface of the router will provide information on the bandwidth and traffic load, which is essential for understanding if the network can handle the current and projected traffic without delays. NetFlow records are crucial for this analysis as they provide data about the traffic flow across the network, which helps in identifying patterns, peak usage times, and types of traffic.This information is vital for making informed decisions to optimize traffic movement and minimize latency123.

Cisco's guide on Network Traffic Analysis1.

Cisco's white paper on Network Security Policy: Best Practices2.

Cisco's documentation on Implementation of High Availability

asked 07/10/2024
Anna Pytka
37 questions

Question 138

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 138 109315 10072024004349000000

What is depicted in the exhibit?

Windows Event logs

Windows Event logs

Apache logs

Apache logs

IIS logs

IIS logs

UNIX-based syslog

UNIX-based syslog

Suggested answer: B
Explanation:

The exhibit shows a UNIX command being used to filter data from an Apache access log file. The use of ''cat'' to display the content of the log file, ''grep'' to filter specific IP addresses, and ''cut'' to organize the output are all indicative of operations performed on a UNIX-based system. Additionally, the structure of the logs (GET requests) aligns with the format typically found in Apache server logs.Reference:= The Cisco Cybersecurity source documents or study guide are not directly referenced here as I need to search for specific content related to this question.

asked 07/10/2024
Prashant Bari
47 questions

Question 139

Report Export Collapse

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

AWS

AWS

IIS

IIS

Load balancer

Load balancer

Proxy server

Proxy server

Suggested answer: C
Explanation:

A load balancer is the correct technology to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier (URI), and SSL session ID attributes.Load balancers can inspect incoming traffic and make routing decisions to distribute the traffic across multiple servers based on various attributes, including the ones mentioned, to ensure optimal resource use and efficient traffic management12.

Cisco Unified Border Element Configuration Guide1.

URI based outbound Dial-peer configuration on CUBE - Cisco Community

asked 07/10/2024
Shauqi Naufaldy
34 questions

Question 140

Report Export Collapse

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.

What is the initial event called in the NIST SP800-61?

online assault

online assault

precursor

precursor

trigger

trigger

instigator

instigator

Suggested answer: B
Explanation:

In the context of NIST SP800-61, a precursor is an event that indicates the potential occurrence of an incident. When an organization adjusts its security stance in response to online threats made by a known hacktivist group, the initial event---the threats---would be considered a precursor.It is an indication of a potential future attack or security incident34.

NIST SP 800-61 Rev.2, Computer Security Incident Handling Guide3.

Computer Security Incident Handling Guide - NIST

asked 07/10/2024
Angela Stevens
64 questions
Total 331 questions
Go to page: of 34