ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 19

Question list
Search
Search

Related questions











Which of these describes SOC metrics in relation to security incidents?

A.

time it takes to detect the incident

A.

time it takes to detect the incident

Answers
B.

time it takes to assess the risks of the incident

B.

time it takes to assess the risks of the incident

Answers
C.

probability of outage caused by the incident

C.

probability of outage caused by the incident

Answers
D.

probability of compromise and impact caused by the incident

D.

probability of compromise and impact caused by the incident

Answers
Suggested answer: A

Explanation:

SOC metrics in relation to security incidents typically refer to the time it takes to detect the incident. These metrics are crucial for evaluating the effectiveness of incident response and remediation efforts by SOC teams. For example, metrics like the Mean Time to Detect (MTTD) enable organizations to assess how quickly they can identify a security incident, which is essential for reducing the impact of the incident on the organization.

What is the difference between the ACK flag and the RST flag?

A.

The RST flag approves the connection, and the ACK flag terminates spontaneous connections.

A.

The RST flag approves the connection, and the ACK flag terminates spontaneous connections.

Answers
B.

The ACK flag confirms the received segment, and the RST flag terminates the connection.

B.

The ACK flag confirms the received segment, and the RST flag terminates the connection.

Answers
C.

The RST flag approves the connection, and the ACK flag indicates that a packet needs to be resent

C.

The RST flag approves the connection, and the ACK flag indicates that a packet needs to be resent

Answers
D.

The ACK flag marks the connection as reliable, and the RST flag indicates the failure within TCP Handshake

D.

The ACK flag marks the connection as reliable, and the RST flag indicates the failure within TCP Handshake

Answers
Suggested answer: B

Explanation:

In TCP/IP networking, the ACK flag is used to acknowledge the receipt of a packet. It's a way to confirm that the previous packets have been received and that the connection is proceeding as expected. The RST flag, on the other hand, is used to reset the connection. It is sent if a segment arrives which is not intended for the current connection, or if a connection request is to be denied.Essentially, the ACK flag is about maintaining the established connection, while the RST flag is about aborting connections that are not valid or are no longer needed123.

Refer to the exhibit.

An engineer is analyzing a PCAP file after a recent breach An engineer identified that the attacker used an aggressive ARP scan to scan the hosts and found web and SSH servers. Further analysis showed several SSH Server Banner and Key Exchange Initiations. The engineer cannot see the exact data being transmitted over an encrypted channel and cannot identify how the attacker gained access How did the attacker gain access?

A.

by using the buffer overflow in the URL catcher feature for SSH

A.

by using the buffer overflow in the URL catcher feature for SSH

Answers
B.

by using an SSH Tectia Server vulnerability to enable host-based authentication

B.

by using an SSH Tectia Server vulnerability to enable host-based authentication

Answers
C.

by using an SSH vulnerability to silently redirect connections to the local host

C.

by using an SSH vulnerability to silently redirect connections to the local host

Answers
D.

by using brute force on the SSH service to gain access

D.

by using brute force on the SSH service to gain access

Answers
Suggested answer: D

Explanation:

The scenario described involves an attacker conducting an aggressive ARP scan followed by multiple SSH Server Banner and Key Exchange Initiations. The lack of visibility into the encrypted data transmitted over the SSH channel suggests that the attacker may have gained access by brute-forcing the SSH service. This method involves attempting numerous combinations of usernames and passwords until the correct credentials are found, allowing unauthorized access to the server.

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course1.

Cisco Cybersecurity documents and resources

Refer to the exhibit.

What is occurring within the exhibit?

A.

regular GET requests

A.

regular GET requests

Answers
B.

XML External Entities attack

B.

XML External Entities attack

Answers
C.

insecure deserialization

C.

insecure deserialization

Answers
D.

cross-site scripting attack

D.

cross-site scripting attack

Answers
Suggested answer: A

Explanation:

Based on the image details, the exhibit shows a series of HTTP requests with the method GET, which are used to retrieve data from a web server. There is no evidence of any malicious payload or parameter in these requests, so they are likely regular GET requests. The other options are types of web application attacks that exploit different vulnerabilities, such as XML External Entities, insecure deserialization, and cross-site scripting.Reference:=Cisco Cybersecurity

https://github.com/gwroblew/detectXSSlib/blob/master/test/attacks.txt

Refer to the exhibit.

Which component is identifiable in this exhibit?

A.

Trusted Root Certificate store on the local machine

A.

Trusted Root Certificate store on the local machine

Answers
B.

Windows PowerShell verb

B.

Windows PowerShell verb

Answers
C.

Windows Registry hive

C.

Windows Registry hive

Answers
D.

local service in the Windows Services Manager

D.

local service in the Windows Services Manager

Answers
Suggested answer: C

Explanation:

The exhibit shows ''HKEY_LOCAL_MACHINE,'' which is a Windows Registry hive. The registry is a database used to store low-level settings for the operating system and for applications that opt to use the registry. The other options are not related to the exhibit, as they are either a part of the Windows Certificate Manager, a naming convention for Windows PowerShell commands, or a component of the Windows Services Manager.Reference:=Cisco Cybersecurity

https://docs.microsoft.com/en-us/windows/win32/sysinfo/registry-hives

https://ldapwiki.com/wiki/HKEY_LOCAL_MACHINE#:~:text=HKEY_LOCAL_MACHINE%20Windows%20registry%20hive%20contains,detected%20hardware%20and%20device%20drivers.

An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigate this resource usage?

A.

Run 'ps -d' to decrease the priority state of high load processes to avoid resource exhaustion.

A.

Run 'ps -d' to decrease the priority state of high load processes to avoid resource exhaustion.

Answers
B.

Run 'ps -u' to find out who executed additional processes that caused a high load on a server.

B.

Run 'ps -u' to find out who executed additional processes that caused a high load on a server.

Answers
C.

Run 'ps -ef' to understand which processes are taking a high amount of resources.

C.

Run 'ps -ef' to understand which processes are taking a high amount of resources.

Answers
D.

Run 'ps -m' to capture the existing state of daemons and map required processes to find the gap.

D.

Run 'ps -m' to capture the existing state of daemons and map required processes to find the gap.

Answers
Suggested answer: C

Explanation:

The ''ps'' command is used to display information about the processes running on a system. The ''-ef'' option shows the full format listing, which includes the process ID, the user, the CPU and memory usage, the command name, and other details. This can help the engineer identify which processes are consuming the most resources and causing the degraded performance of the server. The other options are either invalid or irrelevant, as they do not provide the necessary information or perform the required action.Reference:= Cisco Cybersecurity

What is a difference between an inline and a tap mode traffic monitoring?

A.

Inline monitors traffic without examining other devices, while a tap mode tags traffic and examines the data from monitoring devices.

A.

Inline monitors traffic without examining other devices, while a tap mode tags traffic and examines the data from monitoring devices.

Answers
B.

Tap mode monitors traffic direction, while inline mode keeps packet data as it passes through the monitoring devices.

B.

Tap mode monitors traffic direction, while inline mode keeps packet data as it passes through the monitoring devices.

Answers
C.

Tap mode monitors packets and t heir content with the highest speed, while the inline mode draws a packet path for analysis.

C.

Tap mode monitors packets and t heir content with the highest speed, while the inline mode draws a packet path for analysis.

Answers
D.

Inline mode monitors traffic path, examining any traffic at a wire speed, while a tap mode monitors traffic as it crosses the network.

D.

Inline mode monitors traffic path, examining any traffic at a wire speed, while a tap mode monitors traffic as it crosses the network.

Answers
Suggested answer: D

Explanation:

Inline mode is used for monitoring the traffic path and can examine any traffic at wire speed. This means that it can analyze data packets as they pass through in real-time. On the other hand, tap mode is used for monitoring traffic as it traverses across the network but does not have the capability to examine data at wire speed like inline mode.Reference: The information can be referenced from Cisco's official documentation on cybersecurity operations and fundamentals.

Which regular expression is needed to capture the IP address 192.168.20.232?

A.

^ (?:[0-9]{1,3}\.){3}[0-9]{1,3}

A.

^ (?:[0-9]{1,3}\.){3}[0-9]{1,3}

Answers
B.

^ (?:[0-9]f1,3}\.){1,4}

B.

^ (?:[0-9]f1,3}\.){1,4}

Answers
C.

^ (?:[0-9]{1,3}\.)'

C.

^ (?:[0-9]{1,3}\.)'

Answers
D.

^ ([0-9]-{3})

D.

^ ([0-9]-{3})

Answers
Suggested answer: A

Explanation:

The regular expression ^ (?:[0-9]{1,3}.){3}[0-9]{1,3} is needed to capture the IP address 192.168.20.232. This regex matches any string that starts with three groups of one to three digits followed by a dot, and ends with one group of one to three digits. The IP address 192.168.20.232 matches this pattern exactly. The other options are either invalid or do not match the IP address format.Reference:= Cisco Cybersecurity Operations Fundamentals, Module 5: Security Policies and Procedures, Lesson 5.3: Data and Event Analysis, Topic 5.3.2: Regular Expressions

How does a certificate authority impact security?

A.

It validates client identity when communicating with the server.

A.

It validates client identity when communicating with the server.

Answers
B.

It authenticates client identity when requesting an SSL certificate.

B.

It authenticates client identity when requesting an SSL certificate.

Answers
C.

It authenticates domain identity when requesting an SSL certificate.

C.

It authenticates domain identity when requesting an SSL certificate.

Answers
D.

It validates the domain identity of the SSL certificate.

D.

It validates the domain identity of the SSL certificate.

Answers
Suggested answer: D

Explanation:

A certificate authority (CA) is a trusted entity that issues and manages digital certificates for secure communication over the internet. A digital certificate is a document that contains the public key and the identity of the owner of the key. A CA impacts security by validating the domain identity of the SSL certificate, which is a type of digital certificate that enables encrypted communication between a web server and a web browser. The CA verifies that the domain name in the certificate matches the domain name of the web server, and signs the certificate with its own private key. The web browser can then verify the signature of the CA and trust the identity of the web server.Reference:= Cisco Cybersecurity Operations Fundamentals, Module 2: Security Monitoring, Lesson 2.3: Cryptography and PKI, Topic 2.3.2: Public Key InfrastructureReference: https://en.wikipedia.org/wiki/Certificate_authority

What is a difference between SIEM and SOAR?

A.

SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.

A.

SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.

Answers
B.

SlEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.

B.

SlEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.

Answers
C.

SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.

C.

SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.

Answers
D.

SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.

D.

SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.

Answers
Suggested answer: B

Explanation:

SIEM (Security Information and Event Management) systems are solutions that provide real-time analysis of security alerts generated by applications and network hardware. They collect, store, analyze, and report on log data for incident response, forensics, and regulatory compliance. On the other hand, SOAR (Security Orchestration Automation and Response) platforms allow organizations to collect data about security threats from multiple sources and respond to low-level security events without human assistance.Reference:Cisco Cybersecurity Operations Fundamentals

Total 331 questions
Go to page: of 34