ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











What is the difference between the rule-based detection when compared to behavioral detection?

A.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

A.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

Answers
B.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

B.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

Answers
C.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

C.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

Answers
D.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

D.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Answers
Suggested answer: B

Explanation:

Rule-based detection involves identifying malicious activities based on predefined rules or patterns of known attacks; it does not adapt or change with new data. In contrast, behavioral detection adapts over time by learning from new data; it identifies malicious activities based on deviations from established norms or behaviors.Reference:Cisco Certified CyberOps Associate Overview, Section 1.0: Security Concepts, Subsection 1.1: Compare and contrast the characteristics of data obtained from taps, NetFlow, and packet capture)

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

A.

NetScout

A.

NetScout

Answers
B.

tcpdump

B.

tcpdump

Answers
C.

SolarWinds

C.

SolarWinds

Answers
D.

netsh

D.

netsh

Answers
Suggested answer: B

Explanation:

tcpdump is an open-source packet capture tool that uses the libpcap library to capture network traffic on Linux and Mac OS X operating systems. It can display the contents of packets in various formats, filter packets based on criteria, and save packets to a file.tcpdump is a command-line tool that can be run on a terminal or a remote shell1Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 2: Security Monitoring

Refer to the exhibit.

Which kind of attack method is depicted in this string?

A.

cross-site scripting

A.

cross-site scripting

Answers
B.

man-in-the-middle

B.

man-in-the-middle

Answers
C.

SQL injection

C.

SQL injection

Answers
D.

denial of service

D.

denial of service

Answers
Suggested answer: A

Explanation:

The image shows a piece of code within a bordered rectangular area.

It is a string of HTML code that appears to be an example of an attack, specifically ''<IMG SRC=j%41vascript:alert('attack')>''.

The code suggests an attempt to execute JavaScript within an image source attribute, indicative of a cross-site scripting attack.

Which two components reduce the attack surface on an endpoint? (Choose two.)

A.

secure boot

A.

secure boot

Answers
B.

load balancing

B.

load balancing

Answers
C.

increased audit log levels

C.

increased audit log levels

Answers
D.

restricting USB ports

D.

restricting USB ports

Answers
E.

full packet captures at the endpoint

E.

full packet captures at the endpoint

Answers
Suggested answer: A, D

Explanation:

Secure boot and restricting USB ports are two components that can reduce the attack surface on an endpoint. The attack surface is the sum of all paths for data into and out of the environment. Reducing the attack surface means minimizing the number and complexity of these paths, and thus reducing the opportunities for attackers to exploit vulnerabilities or gain unauthorized access. Secure boot is a feature that ensures that only trusted and verified code can run during the boot process, preventing malware or unauthorized software from compromising the system. Restricting USB ports is a policy that limits the use of USB devices, such as flash drives or external hard drives, that can introduce malware or exfiltrate data from the endpoint.

Reference: [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 4: Network Intrusion Analysis], [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 5: Security Policies and Procedures]

What is an attack surface as compared to a vulnerability?

A.

any potential danger to an asset

A.

any potential danger to an asset

Answers
B.

the sum of all paths for data into and out of the environment

B.

the sum of all paths for data into and out of the environment

Answers
C.

an exploitable weakness in a system or its design

C.

an exploitable weakness in a system or its design

Answers
D.

the individuals who perform an attack

D.

the individuals who perform an attack

Answers
Suggested answer: B

Explanation:

The attack surface is the sum of all paths for data into and out of the environment, such as network interfaces, applications, services, protocols, ports, and user accounts. The attack surface represents the exposure of the environment to potential threats and attacks. A vulnerability is an exploitable weakness in a system or its design that can allow an attacker to compromise the system or its data. A vulnerability is a subset of the attack surface, as not all paths for data are vulnerable.Reference: [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 1: Security Concepts]

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.

Which testing method did the intruder use?

A.

social engineering

A.

social engineering

Answers
B.

eavesdropping

B.

eavesdropping

Answers
C.

piggybacking

C.

piggybacking

Answers
D.

tailgating

D.

tailgating

Answers
Suggested answer: A

Explanation:

Social engineering is a type of testing method that involves manipulating or deceiving people into performing actions or divulging information that can compromise the security of the organization. Social engineering can take various forms, such as phishing, vishing, baiting, quid pro quo, or impersonation. The scenario in the question is an example of a phishing attack, where the intruder sent an email to the user that appeared to be legitimate and contained a malicious link that infected the user's machine and allowed the intruder to access the corporate network.Reference: [Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Module 6: Security Incident Investigations]

Refer to the exhibit.

What is the expected result when the 'Allow subdissector to reassemble TCP streams' feature is enabled?

A.

insert TCP subdissectors

A.

insert TCP subdissectors

Answers
B.

extract a file from a packet capture

B.

extract a file from a packet capture

Answers
C.

disable TCP streams

C.

disable TCP streams

Answers
D.

unfragment TCP

D.

unfragment TCP

Answers
Suggested answer: B

Explanation:

Enabling the ''Allow subdissector to reassemble TCP streams'' feature in Wireshark allows the tool to reassemble TCP segments into a contiguous sequence, which can be used by higher-level protocols to reconstruct a full message, such as an HTTP request or response.This is particularly useful for extracting files or data transmitted over TCP that are spread across multiple packets1.

Which type of data collection requires the largest amount of storage space?

A.

alert data

A.

alert data

Answers
B.

transaction data

B.

transaction data

Answers
C.

session data

C.

session data

Answers
D.

full packet capture

D.

full packet capture

Answers
Suggested answer: D

Explanation:

Full packet capture requires the largest amount of storage space because it involves recording all packets that pass through a network, including all headers and payloads.This type of data collection is comprehensive and allows for detailed analysis, but due to the volume of data it encompasses, it demands significant storage capacity1.

Which event is user interaction?

A.

gaining root access

A.

gaining root access

Answers
B.

executing remote code

B.

executing remote code

Answers
C.

reading and writing file permission

C.

reading and writing file permission

Answers
D.

opening a malicious file

D.

opening a malicious file

Answers
Suggested answer: D

Explanation:

User interaction is any event that requires the user to perform an action that enables or facilitates a cyberattack. Opening a malicious file is an example of user interaction, as it can trigger the execution of malicious code or malware that can compromise the system or network. Gaining root access, executing remote code, and reading and writing file permissions are not user interactions, but rather actions that can be performed by an attacker after exploiting a vulnerability or bypassing security controls.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco,More than 99% of cyberattacks rely on human interaction

Which security principle requires more than one person is required to perform a critical task?

A.

least privilege

A.

least privilege

Answers
B.

need to know

B.

need to know

Answers
C.

separation of duties

C.

separation of duties

Answers
D.

due diligence

D.

due diligence

Answers
Suggested answer: C

Explanation:

Separation of duties is a security principle that requires more than one person to perform a critical task, such as authorizing a transaction, approving a budget, or granting access to sensitive data. Separation of duties reduces the risk of fraud, error, abuse, or conflict of interest by preventing any single person from having too much power or privilege. Least privilege, need to know, and due diligence are other security principles, but they do not require more than one person to perform a critical task.Reference:Separation of Duty (SOD) - Glossary | CSRC - NIST Computer Security ...,Separation of Duties | Imperva

Total 331 questions
Go to page: of 34