ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Related questions











Refer to the exhibit.

Which type of attack is being executed?

A.

SQL injection

A.

SQL injection

Answers
B.

cross-site scripting

B.

cross-site scripting

Answers
C.

cross-site request forgery

C.

cross-site request forgery

Answers
D.

command injection

D.

command injection

Answers
Suggested answer: A

Explanation:

The exhibit shows a SQL query that is attempting to bypass login controls by modifying the query to always return true. This is a common tactic used in SQL injection attacks where malicious SQL statements are inserted into an entry field for execution.Reference:=Cisco Cybersecurity Source Documents

Which attack represents the evasion technique of resource exhaustion?

A.

SQL injection

A.

SQL injection

Answers
B.

man-in-the-middle

B.

man-in-the-middle

Answers
C.

bluesnarfing

C.

bluesnarfing

Answers
D.

denial-of-service

D.

denial-of-service

Answers
Suggested answer: D

Explanation:

A denial-of-service attack represents the evasion technique of resource exhaustion, where the attacker overwhelms a system's resources, making the system unusable and unable to handle legitimate requests.Reference:=Cisco Cybersecurity Source Documents

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?

A.

event name, log source, time, source IP, and host name

A.

event name, log source, time, source IP, and host name

Answers
B.

protocol, source IP, source port, destination IP, and destination port

B.

protocol, source IP, source port, destination IP, and destination port

Answers
C.

event name, log source, time, source IP, and username

C.

event name, log source, time, source IP, and username

Answers
D.

protocol, log source, source IP, destination IP, and host name

D.

protocol, log source, source IP, destination IP, and host name

Answers
Suggested answer: B

Explanation:

The 5-tuple approach consists of protocol, source IP address, source port number, destination IP address, and destination port number to uniquely identify sessions between endpoints on a network.Reference:=Cisco Cybersecurity Source Documents

Which event is a vishing attack?

A.

obtaining disposed documents from an organization

A.

obtaining disposed documents from an organization

Answers
B.

using a vulnerability scanner on a corporate network

B.

using a vulnerability scanner on a corporate network

Answers
C.

setting up a rogue access point near a public hotspot

C.

setting up a rogue access point near a public hotspot

Answers
D.

impersonating a tech support agent during a phone call

D.

impersonating a tech support agent during a phone call

Answers
Suggested answer: D

Explanation:

Vishing is an attack where fraudsters impersonate legitimate entities via phone calls to deceive individuals into providing sensitive information or performing actions that compromise security.Reference:=Cisco Cybersecurity Source Documents

What is indicated by an increase in IPv4 traffic carrying protocol 41 ?

A.

additional PPTP traffic due to Windows clients

A.

additional PPTP traffic due to Windows clients

Answers
B.

unauthorized peer-to-peer traffic

B.

unauthorized peer-to-peer traffic

Answers
C.

deployment of a GRE network on top of an existing Layer 3 network

C.

deployment of a GRE network on top of an existing Layer 3 network

Answers
D.

attempts to tunnel IPv6 traffic through an IPv4 network

D.

attempts to tunnel IPv6 traffic through an IPv4 network

Answers
Suggested answer: D

Explanation:

Protocol 41 is used to encapsulate IPv6 packets in IPv4 headers for transmission over an IPv4 network. This is one of the methods to implement IPv6 transition mechanisms for hosts and routers that are located on IPv4 networks. An increase in IPv4 traffic carrying protocol 41 may indicate that some hosts or routers are trying to tunnel IPv6 traffic through an IPv4 network, which could be a legitimate or malicious activity depending on the network policy.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 177; [IPv6 Transition Mechanisms for IPv4 Domains]

What is the impact of false positive alerts on business compared to true positive?

A.

True positives affect security as no alarm is raised when an attack has taken place, while false positives are alerts raised appropriately to detect and further mitigate them.

A.

True positives affect security as no alarm is raised when an attack has taken place, while false positives are alerts raised appropriately to detect and further mitigate them.

Answers
B.

True-positive alerts are blocked by mistake as potential attacks, while False-positives are actual attacks Identified as harmless.

B.

True-positive alerts are blocked by mistake as potential attacks, while False-positives are actual attacks Identified as harmless.

Answers
C.

False-positive alerts are detected by confusion as potential attacks, while true positives are attack attempts identified appropriately.

C.

False-positive alerts are detected by confusion as potential attacks, while true positives are attack attempts identified appropriately.

Answers
D.

False positives alerts are manually ignored signatures to avoid warnings that are already acknowledged, while true positives are warnings that are not yet acknowledged.

D.

False positives alerts are manually ignored signatures to avoid warnings that are already acknowledged, while true positives are warnings that are not yet acknowledged.

Answers
Suggested answer: C

Explanation:

False-positive alerts are alerts that are triggered by benign or normal network traffic and are mistakenly identified as malicious. False positives can have a negative impact on business as they may consume the resources and time of the security team that need to analyze and verify them. True-positive alerts are alerts that correctly identify malicious traffic or activity and require proper incident response procedures. True positives can help the security team to quickly detect and mitigate threats and minimize the damage to the organization.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 92; [Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide], page 98

An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?

A.

by most active source IP

A.

by most active source IP

Answers
B.

by most used ports

B.

by most used ports

Answers
C.

based on the protocols used

C.

based on the protocols used

Answers
D.

based on the most used applications

D.

based on the most used applications

Answers
Suggested answer: A

Explanation:

To isolate the suspicious host that is performing intensive network scanning, the analyst should collect the traffic by most active source IP. This will help to identify the IP address of the host that is generating the most traffic and sending the most packets or bytes. The analyst can then apply filters or queries to analyze the traffic from that source IP and determine the nature and scope of the scanning activity.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 72; [Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide], page 468

What is an incident response plan?

A.

an organizational approach to events that could lead to asset loss or disruption of operations

A.

an organizational approach to events that could lead to asset loss or disruption of operations

Answers
B.

an organizational approach to security management to ensure a service lifecycle and continuous improvements

B.

an organizational approach to security management to ensure a service lifecycle and continuous improvements

Answers
C.

an organizational approach to disaster recovery and timely restoration of operational services

C.

an organizational approach to disaster recovery and timely restoration of operational services

Answers
D.

an organizational approach to system backup and data archiving aligned to regulations

D.

an organizational approach to system backup and data archiving aligned to regulations

Answers
Suggested answer: A

Explanation:

An incident response plan is a document that defines the roles and responsibilities, procedures, and processes for detecting, analyzing, containing, eradicating, recovering, and learning from security incidents. The purpose of an incident response plan is to minimize the impact of incidents on the organization's assets, operations, and reputation, and to restore normal operations as quickly as possible. An incident response plan is not the same as a security management plan, a disaster recovery plan, or a backup and archiving plan, although they may be related or complementary.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 92;NIST SP 800-61 Rev. 2, Computer Security Incident Handling Guide, page 2-3

An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN. What is causing this issue?

A.

incorrect TCP handshake

A.

incorrect TCP handshake

Answers
B.

incorrect UDP handshake

B.

incorrect UDP handshake

Answers
C.

incorrect OSI configuration

C.

incorrect OSI configuration

Answers
D.

incorrect snaplen configuration

D.

incorrect snaplen configuration

Answers
Suggested answer: A

Explanation:

A TCP handshake is a three-way exchange of messages between a client and a server to establish a TCP connection. The client initiates the handshake by sending a SYN packet with a sequence number to the server. The server responds with a SYN-ACK packet with its own sequence number and an acknowledgment number that is the client's sequence number plus one. The client completes the handshake by sending an ACK packet with an acknowledgment number that is the server's sequence number plus one. If the remote server is not receiving an SYN-ACK packet from the local server, it means that the TCP handshake is not completed and the connection is not established. This could be caused by various factors, such as network congestion, firewall rules, packet filtering, or misconfiguration of the TCP parameters on either end.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 177;TCP 3-Way Handshake Process - GeeksforGeeks

A security incident occurred with the potential of impacting business services. Who performs the attack?

A.

malware author

A.

malware author

Answers
B.

threat actor

B.

threat actor

Answers
C.

bug bounty hunter

C.

bug bounty hunter

Answers
D.

direct competitor

D.

direct competitor

Answers
Suggested answer: B

Explanation:

A threat actor is a person or entity that is responsible for an incident that impacts or has the potential to impact an organization's security. A threat actor can have various motivations, such as financial gain, espionage, sabotage, or activism. A threat actor can use various methods, such as malware, phishing, denial-of-service, or social engineering, to perform an attack. A threat actor is not the same as a malware author, a bug bounty hunter, or a direct competitor, although they may be related or associated. A malware author is someone who creates malicious software that can be used by threat actors. A bug bounty hunter is someone who finds and reports vulnerabilities in software or systems for a reward. A direct competitor is someone who offers similar products or services as the organization and may seek to gain an advantage over it.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 87;CNSSI 4009-2015, page 77

Total 331 questions
Go to page: of 34