Cisco 200-201 Practice Test - Questions Answers, Page 17
List of questions
Question 161

Refer to the exhibit.
Which type of attack is being executed?
SQL injection
cross-site scripting
cross-site request forgery
command injection
The exhibit shows a SQL query that is attempting to bypass login controls by modifying the query to always return true. This is a common tactic used in SQL injection attacks where malicious SQL statements are inserted into an entry field for execution.Reference:=Cisco Cybersecurity Source Documents
Question 162

Which attack represents the evasion technique of resource exhaustion?
SQL injection
man-in-the-middle
bluesnarfing
denial-of-service
A denial-of-service attack represents the evasion technique of resource exhaustion, where the attacker overwhelms a system's resources, making the system unusable and unable to handle legitimate requests.Reference:=Cisco Cybersecurity Source Documents
Question 163

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
event name, log source, time, source IP, and host name
protocol, source IP, source port, destination IP, and destination port
event name, log source, time, source IP, and username
protocol, log source, source IP, destination IP, and host name
The 5-tuple approach consists of protocol, source IP address, source port number, destination IP address, and destination port number to uniquely identify sessions between endpoints on a network.Reference:=Cisco Cybersecurity Source Documents
Question 164

Which event is a vishing attack?
obtaining disposed documents from an organization
using a vulnerability scanner on a corporate network
setting up a rogue access point near a public hotspot
impersonating a tech support agent during a phone call
Vishing is an attack where fraudsters impersonate legitimate entities via phone calls to deceive individuals into providing sensitive information or performing actions that compromise security.Reference:=Cisco Cybersecurity Source Documents
Question 165

What is indicated by an increase in IPv4 traffic carrying protocol 41 ?
Question 166

What is the impact of false positive alerts on business compared to true positive?
Question 167

An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?
Question 168

What is an incident response plan?
Question 169

An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN. What is causing this issue?
Question 170

A security incident occurred with the potential of impacting business services. Who performs the attack?
Question