ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











Refer to the exhibit.

What does this output indicate?

A.

HTTPS ports are open on the server.

A.

HTTPS ports are open on the server.

Answers
B.

SMB ports are closed on the server.

B.

SMB ports are closed on the server.

Answers
C.

FTP ports are open on the server.

C.

FTP ports are open on the server.

Answers
D.

Email ports are closed on the server.

D.

Email ports are closed on the server.

Answers
Suggested answer: D

Explanation:

What Are Ports 139 And 445? SMB has always been a network file sharing protocol. As such, SMB requires network ports on a computer or server to enable communication to other systems. SMB uses either IP port 139 or 445. Port 139 - SMB originally ran on top of NetBIOS using port 139. NetBIOS is an older transport layer that allows Windows computers to talk to each other on the same network. Port 445 - Later versions of SMB (after Windows 2000) began to use port 445 on top of a TCP stack. Using TCP allows SMB to work over the internet. https://www.varonis.com/blog/smb-port SMB Ports 139 and 445 are open Email Ports 25 and 110 are closed Therefore 'D. Email Ports are closed on the Server.'

Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?

A.

The average time the SOC takes to register and assign the incident.

A.

The average time the SOC takes to register and assign the incident.

Answers
B.

The total incident escalations per week.

B.

The total incident escalations per week.

Answers
C.

The average time the SOC takes to detect and resolve the incident.

C.

The average time the SOC takes to detect and resolve the incident.

Answers
D.

The total incident escalations per month.

D.

The total incident escalations per month.

Answers
Suggested answer: C

Explanation:

The average time taken by a Security Operations Center (SOC) to detect and resolve incidents is a critical metric for evaluating its effectiveness and scope. This metric reflects the SOC's efficiency in identifying security threats and its ability to respond and mitigate those threats promptly.It encompasses the entire incident lifecycle, from initial detection to final resolution, providing a comprehensive measure of the SOC's performance1.

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

A developer is working on a project using a Linux tool that enables writing processes to obtain these required results:

If the process is unsuccessful, a negative value is returned.

If the process is successful, 0 value is returned to the child process, and the process ID is sent to the parent process.

Which component results from this operation?

A.

parent directory name of a file pathname

A.

parent directory name of a file pathname

Answers
B.

process spawn scheduled

B.

process spawn scheduled

Answers
C.

macros for managing CPU sets

C.

macros for managing CPU sets

Answers
D.

new process created by parent process

D.

new process created by parent process

Answers
Suggested answer: D

Explanation:

The operation described is characteristic of thefork()system call in Linux, which is used to create a new process. Thefork()system call generates a new process by duplicating the calling (parent) process. If thefork()is successful, the PID of the child process is returned to the parent process, and a 0 value is returned to the child process.If unsuccessful, a negative value is returned2.

How to create a process in Linux? - Online Tutorials Library

An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?

A.

Recover from the threat.

A.

Recover from the threat.

Answers
B.

Analyze the threat.

B.

Analyze the threat.

Answers
C.

Identify lessons learned from the threat.

C.

Identify lessons learned from the threat.

Answers
D.

Reduce the probability of similar threats.

D.

Reduce the probability of similar threats.

Answers
Suggested answer: A

Explanation:

After a breach has been discovered and the immediate threat has been addressed by identifying and removing the threat's access, the next step according to the NIST SP 800-61 Incident Handling Guide is to recover from the threat.This involves restoring systems to normal operation, confirming that the systems are functioning normally, and applying patches or other remediation measures to prevent similar breaches in the future1.

Understanding NIST SP 800-61: The Computer Security Incident Handling Guide

Refer to the exhibit.

What is shown in this PCAP file?

A.

Timestamps are indicated with error.

A.

Timestamps are indicated with error.

Answers
B.

The protocol is TCP.

B.

The protocol is TCP.

Answers
C.

The User-Agent is Mozilla/5.0.

C.

The User-Agent is Mozilla/5.0.

Answers
D.

The HTTP GET is encoded.

D.

The HTTP GET is encoded.

Answers
Suggested answer: C

Explanation:

The PCAP file shows a network packet capture of an HTTP GET request from a client to a server. The User-Agent header field identifies the type and version of the client software that generated the request. In this case, the User-Agent is Mozilla/5.0, which indicates that the client is using a Mozilla-based browser or application. The User-Agent can help the server to customize the response based on the client's capabilities and preferences.Reference: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Protocols and Services, Lesson 3.2: HTTP and HTTPS, Topic 3.2.1: HTTP Headers.

1of30

What is a difference between tampered and untampered disk images?

A.

Tampered images have the same stored and computed hash.

A.

Tampered images have the same stored and computed hash.

Answers
B.

Tampered images are used as evidence.

B.

Tampered images are used as evidence.

Answers
C.

Untampered images are used for forensic investigations.

C.

Untampered images are used for forensic investigations.

Answers
D.

Untampered images are deliberately altered to preserve as evidence

D.

Untampered images are deliberately altered to preserve as evidence

Answers
Suggested answer: C

Explanation:

Tampered images are disk images that have been modified or altered in some way after they were captured from the original source. Tampered images may have different stored and computed hash values, which indicate that the integrity of the image has been compromised. Tampered images are not reliable or valid sources of evidence for forensic investigations, as they may contain false or misleading information. Untampered images are disk images that have not been changed or manipulated after they were acquired from the original source. Untampered images have the same stored and computed hash values, which verify that the image is an exact copy of the original disk. Untampered images are used for forensic investigations, as they preserve the original state and content of the disk and provide accurate and trustworthy evidence.Reference:

Contrasting tampered and untampered disk images

What is a difference between tampered and untampered disk images?

The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?

A.

Isolate the infected endpoint from the network.

A.

Isolate the infected endpoint from the network.

Answers
B.

Perform forensics analysis on the infected endpoint.

B.

Perform forensics analysis on the infected endpoint.

Answers
C.

Collect public information on the malware behavior.

C.

Collect public information on the malware behavior.

Answers
D.

Prioritize incident handling based on the impact.

D.

Prioritize incident handling based on the impact.

Answers
Suggested answer: C

Explanation:

According to the NIST Computer Security Incident Handling Guide, the next step in handling an event after confirming a potential indicator of compromise on an endpoint is to collect public information on the malware behavior. This step involves searching for information from various sources, such as antivirus vendors, security blogs, threat intelligence feeds, and online forums, to learn more about the characteristics, capabilities, and impact of the malware. This information can help the SOC team to identify the type, severity, and scope of the incident, as well as to determine the appropriate response actions and mitigation strategies. Isolating the infected endpoint, performing forensics analysis, and prioritizing incident handling are subsequent steps that follow after collecting public information on the malware behavior.Reference:

Computer Security Incident Handling Guide

SP 800-61 Rev. 2, Computer Security Incident Handling Guide

Which technology on a host is used to isolate a running application from other applications?

A.

sandbox

A.

sandbox

Answers
B.

application allow list

B.

application allow list

Answers
C.

application block list

C.

application block list

Answers
D.

host-based firewall

D.

host-based firewall

Answers
Suggested answer: A

Explanation:

A sandbox is a technology on a host that is used to isolate a running application from other applications. A sandbox creates a controlled and restricted environment for the application to execute, limiting its access to system resources and data. A sandbox can prevent the application from spreading malware, stealing information, or causing damage to the host or the network. A sandbox can also be used to test and analyze the behavior of unknown or suspicious applications without risking the security of the host. Application allow list, application block list, and host-based firewall are other technologies on a host that can be used to control or restrict the execution of applications, but they do not isolate them from other applications.Reference:

How can I best isolate a particular program (game)

App isolation in Windows 10

Types of Endpoint Application Isolation and Containment Technology

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

A.

Recovery

A.

Recovery

Answers
B.

Detection

B.

Detection

Answers
C.

Eradication

C.

Eradication

Answers
D.

Analysis

D.

Analysis

Answers
Suggested answer: D

Explanation:

According to the NIST Incident Handling Guide, the analysis phase is the next phase of this investigation. The analysis phase involves examining the evidence and determining the impact, scope, and cause of the incident. The analyst should also identify the attacker's methods, tools, and objectives, as well as any indicators of compromise or malicious activity. The analysis phase may also involve collecting additional data, such as logs, network traffic, or malware samples, to support the investigation. The analysis phase is crucial for developing an effective response and recovery strategy, as well as preventing or mitigating future incidents.Reference:

NIST Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide, Section 3.2.4, Analysis (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf)

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 5: Security Incident Response, Lesson 5.2: Incident Response Process, Topic 5.2.3: Analysis Phase (https://learningnetworkstore.cisco.com/on-demand-e-learning/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-v1-0/CSCU-LP-CBROPS-V1-028093.html)

Which data type is necessary to get information about source/destination ports?

A.

statistical data

A.

statistical data

Answers
B.

session data

B.

session data

Answers
C.

connectivity data

C.

connectivity data

Answers
D.

alert data

D.

alert data

Answers
Suggested answer: B

Explanation:

Session data is the data type that is necessary to get information about source/destination ports. Session data is the information about connections between hosts, such as IP addresses, ports, protocols, and duration. Session data can be used to identify the services and applications that are being used on the network, as well as the direction and volume of the traffic. Session data can also help to detect anomalous or malicious behavior, such as port scanning, brute force attacks, or data exfiltration. Session data can be collected from various sources, such as firewalls, routers, switches, or network monitoring tools.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 2: Security Monitoring, Lesson 2.2: Data Sources, Topic 2.2.2: Session Data (https://learningnetworkstore.cisco.com/on-demand-e-learning/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-v1-0/CSCU-LP-CBROPS-V1-028093.html)

Cisco Certified CyberOps Associate Certification Guide, Chapter 3: Data Sources, Section 3.2: Session Data (https://www.ciscopress.com/store/cisco-certified-cyberops-associate-certification-guide-9780136807834)

https://www.ibm.com/docs/en/networkmanager/4.2.0?topic=relationships-connectivity-data

Total 331 questions
Go to page: of 34