ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

What is the difference between the rule-based detection when compared to behavioral detection?

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Suggested answer: B
Explanation:

Rule-based detection involves identifying malicious activities based on predefined rules or patterns of known attacks; it does not adapt or change with new data. In contrast, behavioral detection adapts over time by learning from new data; it identifies malicious activities based on deviations from established norms or behaviors.Reference:Cisco Certified CyberOps Associate Overview, Section 1.0: Security Concepts, Subsection 1.1: Compare and contrast the characteristics of data obtained from taps, NetFlow, and packet capture)

asked 07/10/2024
Fabio Morais Melo
44 questions

Question 12

Report Export Collapse

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

NetScout

NetScout

tcpdump

tcpdump

SolarWinds

SolarWinds

netsh

netsh

Suggested answer: B
Explanation:

tcpdump is an open-source packet capture tool that uses the libpcap library to capture network traffic on Linux and Mac OS X operating systems. It can display the contents of packets in various formats, filter packets based on criteria, and save packets to a file.tcpdump is a command-line tool that can be run on a terminal or a remote shell1Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 2: Security Monitoring

asked 07/10/2024
Mohit Mohit
49 questions

Question 13

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 13 109190 10072024004348000000

Which kind of attack method is depicted in this string?

cross-site scripting

cross-site scripting

man-in-the-middle

man-in-the-middle

SQL injection

SQL injection

denial of service

denial of service

Suggested answer: A
Explanation:

The image shows a piece of code within a bordered rectangular area.

It is a string of HTML code that appears to be an example of an attack, specifically ''<IMG SRC=j%41vascript:alert('attack')>''.

The code suggests an attempt to execute JavaScript within an image source attribute, indicative of a cross-site scripting attack.

asked 07/10/2024
Fiston LOMATE
49 questions

Question 14

Report Export Collapse

Which two components reduce the attack surface on an endpoint? (Choose two.)

secure boot

secure boot

load balancing

load balancing

increased audit log levels

increased audit log levels

restricting USB ports

restricting USB ports

full packet captures at the endpoint

full packet captures at the endpoint

Suggested answer: A, D
Explanation:

Secure boot and restricting USB ports are two components that can reduce the attack surface on an endpoint. The attack surface is the sum of all paths for data into and out of the environment. Reducing the attack surface means minimizing the number and complexity of these paths, and thus reducing the opportunities for attackers to exploit vulnerabilities or gain unauthorized access. Secure boot is a feature that ensures that only trusted and verified code can run during the boot process, preventing malware or unauthorized software from compromising the system. Restricting USB ports is a policy that limits the use of USB devices, such as flash drives or external hard drives, that can introduce malware or exfiltrate data from the endpoint.

Reference: [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 4: Network Intrusion Analysis], [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 5: Security Policies and Procedures]

asked 07/10/2024
ALBERTO BONATO
49 questions

Question 15

Report Export Collapse

What is an attack surface as compared to a vulnerability?

any potential danger to an asset

any potential danger to an asset

the sum of all paths for data into and out of the environment

the sum of all paths for data into and out of the environment

an exploitable weakness in a system or its design

an exploitable weakness in a system or its design

the individuals who perform an attack

the individuals who perform an attack

Suggested answer: B
Explanation:

The attack surface is the sum of all paths for data into and out of the environment, such as network interfaces, applications, services, protocols, ports, and user accounts. The attack surface represents the exposure of the environment to potential threats and attacks. A vulnerability is an exploitable weakness in a system or its design that can allow an attacker to compromise the system or its data. A vulnerability is a subset of the attack surface, as not all paths for data are vulnerable.Reference: [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 1: Security Concepts]

asked 07/10/2024
Carolina Velayos
54 questions

Question 16

Report Export Collapse

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.

Which testing method did the intruder use?

social engineering

social engineering

eavesdropping

eavesdropping

piggybacking

piggybacking

tailgating

tailgating

Suggested answer: A
Explanation:

Social engineering is a type of testing method that involves manipulating or deceiving people into performing actions or divulging information that can compromise the security of the organization. Social engineering can take various forms, such as phishing, vishing, baiting, quid pro quo, or impersonation. The scenario in the question is an example of a phishing attack, where the intruder sent an email to the user that appeared to be legitimate and contained a malicious link that infected the user's machine and allowed the intruder to access the corporate network.Reference: [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 6: Security Incident Investigations]

asked 07/10/2024
Mark Oh
38 questions

Question 17

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 17 109194 10072024004348000000

What is the expected result when the 'Allow subdissector to reassemble TCP streams' feature is enabled?

insert TCP subdissectors

insert TCP subdissectors

extract a file from a packet capture

extract a file from a packet capture

disable TCP streams

disable TCP streams

unfragment TCP

unfragment TCP

Suggested answer: B
Explanation:

Enabling the ''Allow subdissector to reassemble TCP streams'' feature in Wireshark allows the tool to reassemble TCP segments into a contiguous sequence, which can be used by higher-level protocols to reconstruct a full message, such as an HTTP request or response.This is particularly useful for extracting files or data transmitted over TCP that are spread across multiple packets1.

asked 07/10/2024
roberto gaccetta
41 questions

Question 18

Report Export Collapse

Which type of data collection requires the largest amount of storage space?

alert data

alert data

transaction data

transaction data

session data

session data

full packet capture

full packet capture

Suggested answer: D
Explanation:

Full packet capture requires the largest amount of storage space because it involves recording all packets that pass through a network, including all headers and payloads.This type of data collection is comprehensive and allows for detailed analysis, but due to the volume of data it encompasses, it demands significant storage capacity1.

asked 07/10/2024
Wessel Beulink
47 questions

Question 19

Report Export Collapse

Which event is user interaction?

gaining root access

gaining root access

executing remote code

executing remote code

reading and writing file permission

reading and writing file permission

opening a malicious file

opening a malicious file

Suggested answer: D
Explanation:

User interaction is any event that requires the user to perform an action that enables or facilitates a cyberattack. Opening a malicious file is an example of user interaction, as it can trigger the execution of malicious code or malware that can compromise the system or network. Gaining root access, executing remote code, and reading and writing file permissions are not user interactions, but rather actions that can be performed by an attacker after exploiting a vulnerability or bypassing security controls.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco,More than 99% of cyberattacks rely on human interaction

asked 07/10/2024
Lazar Marinovic
38 questions

Question 20

Report Export Collapse

Which security principle requires more than one person is required to perform a critical task?

least privilege

least privilege

need to know

need to know

separation of duties

separation of duties

due diligence

due diligence

Suggested answer: C
Explanation:

Separation of duties is a security principle that requires more than one person to perform a critical task, such as authorizing a transaction, approving a budget, or granting access to sensitive data. Separation of duties reduces the risk of fraud, error, abuse, or conflict of interest by preventing any single person from having too much power or privilege. Least privilege, need to know, and due diligence are other security principles, but they do not require more than one person to perform a critical task.Reference:Separation of Duty (SOD) - Glossary | CSRC - NIST Computer Security ...,Separation of Duties | Imperva

asked 07/10/2024
Jonas Junker
46 questions
Total 331 questions
Go to page: of 34