ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?

A.

Modify the settings of the intrusion detection system.

A.

Modify the settings of the intrusion detection system.

Answers
B.

Design criteria for reviewing alerts.

B.

Design criteria for reviewing alerts.

Answers
C.

Redefine signature rules.

C.

Redefine signature rules.

Answers
D.

Adjust the alerts schedule.

D.

Adjust the alerts schedule.

Answers
Suggested answer: B

Explanation:

When a system is overwhelmed with alerts, designing criteria for reviewing alerts can help prioritize and manage them more effectively.This approach allows for a structured review process that can distinguish between false positives, false negatives, and legitimate alerts, reducing the overall number of alerts that require attention3.

What is the impact of false positive alerts on business compared to true positive?

A.

True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

A.

True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

Answers
B.

True positive alerts are blocked by mistake as potential attacks affecting application availability.

B.

True positive alerts are blocked by mistake as potential attacks affecting application availability.

Answers
C.

False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

C.

False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.

Answers
D.

False positive alerts are blocked by mistake as potential attacks affecting application availability.

D.

False positive alerts are blocked by mistake as potential attacks affecting application availability.

Answers
Suggested answer: D

Explanation:

The log in the exhibit is generated by a firewall. It shows a deny action taken on TCP traffic, specifying the source and destination addresses and ports, which is characteristic of firewall logs. Firewalls are designed to control incoming and outgoing network traffic based on predetermined security rules, and this log entry reflects the enforcement of such a rule.

Cisco's official documentation on firewall technologies and their log formats.

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

A.

Firepower

A.

Firepower

Answers
B.

Email Security Appliance

B.

Email Security Appliance

Answers
C.

Web Security Appliance

C.

Web Security Appliance

Answers
D.

Stealthwatch

D.

Stealthwatch

Answers
Suggested answer: D

Explanation:

Stealthwatch is the technology that an engineer should use to fetch logs from a proxy server and generate actual events based on the data received. Cisco Secure Network Analytics, formerly known as Stealthwatch, provides the capability to configure proxy server logs so that the Flow Collector can receive the information.The Stealthwatch Management Console then displays this information on the Flow Proxy Records page, which includes URLs and application names of the traffic inside a network going through the proxy server1.

Cisco Secure Network Analytics Proxy Log Configuration Guide

Refer to the exhibit.

Which technology generates this log?

A.

NetFlow

A.

NetFlow

Answers
B.

IDS

B.

IDS

Answers
C.

web proxy

C.

web proxy

Answers
D.

firewall

D.

firewall

Answers
Suggested answer: D

Explanation:

The log in the exhibit is generated by a firewall. It shows a deny action taken on TCP traffic, specifying the source and destination addresses and ports, which is characteristic of firewall logs. Firewalls are designed to control incoming and outgoing network traffic based on predetermined security rules, and this log entry reflects the enforcement of such a rule.

Cisco's official documentation on firewall technologies and their log formats.

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?

A.

src=10.11.0.0/16 and dst=10.11.0.0/16

A.

src=10.11.0.0/16 and dst=10.11.0.0/16

Answers
B.

ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16

B.

ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16

Answers
C.

ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16

C.

ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16

Answers
D.

src==10.11.0.0/16 and dst==10.11.0.0/16

D.

src==10.11.0.0/16 and dst==10.11.0.0/16

Answers
Suggested answer: B

Explanation:

In Wireshark, to filter traffic for a specific LAN, the correct syntax usesip.src==andip.dst==to specify the source and destination IP addresses. The/16denotes the subnet mask, indicating that we are interested in the entire 10.11.x.x range.This filter will show all traffic where both the source and destination IP addresses fall within the specified LAN, excluding any internet traffic.Reference:: The information is based on the Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course, which covers network intrusion analysis and the use of tools like Wireshark for traffic analysis1.

Which tool provides a full packet capture from network traffic?

A.

Nagios

A.

Nagios

Answers
B.

CAINE

B.

CAINE

Answers
C.

Hydra

C.

Hydra

Answers
D.

Wireshark

D.

Wireshark

Answers
Suggested answer: D

Explanation:

Wireshark is a widely-used network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network.It provides full packet capture capabilities, enabling detailed analysis of network traffic.Reference:: This is supported by the CBROPS course materials, which discuss security monitoring and the analysis of network traffic, including full packet capture tools like Wireshark

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?

A.

total throughput on the interface of the router and NetFlow records

A.

total throughput on the interface of the router and NetFlow records

Answers
B.

output of routing protocol authentication failures and ports used

B.

output of routing protocol authentication failures and ports used

Answers
C.

running processes on the applications and their total network usage

C.

running processes on the applications and their total network usage

Answers
D.

deep packet captures of each application flow and duration

D.

deep packet captures of each application flow and duration

Answers
Suggested answer: A

Explanation:

For high availability and responsiveness, especially where milliseconds of latency are critical, an engineer must analyze the network's performance in detail. Total throughput on the interface of the router will provide information on the bandwidth and traffic load, which is essential for understanding if the network can handle the current and projected traffic without delays. NetFlow records are crucial for this analysis as they provide data about the traffic flow across the network, which helps in identifying patterns, peak usage times, and types of traffic.This information is vital for making informed decisions to optimize traffic movement and minimize latency123.

Cisco's guide on Network Traffic Analysis1.

Cisco's white paper on Network Security Policy: Best Practices2.

Cisco's documentation on Implementation of High Availability

Refer to the exhibit.

What is depicted in the exhibit?

A.

Windows Event logs

A.

Windows Event logs

Answers
B.

Apache logs

B.

Apache logs

Answers
C.

IIS logs

C.

IIS logs

Answers
D.

UNIX-based syslog

D.

UNIX-based syslog

Answers
Suggested answer: B

Explanation:

The exhibit shows a UNIX command being used to filter data from an Apache access log file. The use of ''cat'' to display the content of the log file, ''grep'' to filter specific IP addresses, and ''cut'' to organize the output are all indicative of operations performed on a UNIX-based system. Additionally, the structure of the logs (GET requests) aligns with the format typically found in Apache server logs.Reference:= The Cisco Cybersecurity source documents or study guide are not directly referenced here as I need to search for specific content related to this question.

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

A.

AWS

A.

AWS

Answers
B.

IIS

B.

IIS

Answers
C.

Load balancer

C.

Load balancer

Answers
D.

Proxy server

D.

Proxy server

Answers
Suggested answer: C

Explanation:

A load balancer is the correct technology to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier (URI), and SSL session ID attributes.Load balancers can inspect incoming traffic and make routing decisions to distribute the traffic across multiple servers based on various attributes, including the ones mentioned, to ensure optimal resource use and efficient traffic management12.

Cisco Unified Border Element Configuration Guide1.

URI based outbound Dial-peer configuration on CUBE - Cisco Community

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.

What is the initial event called in the NIST SP800-61?

A.

online assault

A.

online assault

Answers
B.

precursor

B.

precursor

Answers
C.

trigger

C.

trigger

Answers
D.

instigator

D.

instigator

Answers
Suggested answer: B

Explanation:

In the context of NIST SP800-61, a precursor is an event that indicates the potential occurrence of an incident. When an organization adjusts its security stance in response to online threats made by a known hacktivist group, the initial event---the threats---would be considered a precursor.It is an indication of a potential future attack or security incident34.

NIST SP 800-61 Rev.2, Computer Security Incident Handling Guide3.

Computer Security Incident Handling Guide - NIST

Total 331 questions
Go to page: of 34