ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 20

Question list
Search
Search

Related questions











What is a difference between signature-based and behavior-based detection?

A.

Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.

A.

Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.

Answers
B.

Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.

B.

Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.

Answers
C.

Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.

C.

Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.

Answers
D.

Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.

D.

Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.

Answers
Suggested answer: B

Explanation:

Behavior-based detection monitors the behavior of programs in real-time. If a piece of software acts similarly to known malware after it's been executed, behavior-based detection can stop it in its tracks. Signature-based detection involves searching for known patterns of data within executable code; if a pattern matches a ''signature'' in the system's database that is considered malicious.Reference:Cisco Cybersecurity Operations Fundamentals

Refer to the exhibit.

An engineer received an event log file to review. Which technology generated the log?

A.

NetFlow

A.

NetFlow

Answers
B.

proxy

B.

proxy

Answers
C.

firewall

C.

firewall

Answers
D.

IDS/IPS

D.

IDS/IPS

Answers
Suggested answer: D

Explanation:

The exhibit shows an event log file with fields like date time action protocol src-ip dst-ip src-port dst-port etc., which are typical in Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS). These systems monitor network traffic for suspicious activity or violations of policies and produce reports as seen in the exhibit.Reference:Cisco Certified CyberOps Associate Overview

What is the difference between inline traffic interrogation and traffic mirroring?

A.

Inline interrogation is less complex as traffic mirroring applies additional tags to data.

A.

Inline interrogation is less complex as traffic mirroring applies additional tags to data.

Answers
B.

Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools

B.

Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools

Answers
C.

Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.

C.

Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.

Answers
D.

Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.

D.

Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.

Answers
Suggested answer: B

Explanation:

Traffic mirroring is a technique that copies the traffic from a source port or VLAN to a destination port or VLAN, where it can be analyzed by a security device or tool. Traffic mirroring does not affect the original traffic flow and does not introduce any latency or modification to the packets. Inline traffic interrogation is a technique that forwards the traffic directly to the security device or tool, where it can be inspected and modified before being sent to the destination. Inline traffic interrogation can introduce latency and affect the performance of the network.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, Module 2: Security Monitoring, Lesson 2.2: Network Security Monitoring Tools

200-201 CBROPS - Cisco, Exam Topics, 2.0 Security Monitoring, 2.2 Describe the impact of various technologies on security monitoring

Cisco Certified CyberOps Associate Overview - Cisco Learning Network, Videos, 2.2 Describe the impact of various technologies on security monitoring

Refer to the exhibit.

A company employee is connecting to mail google.com from an endpoint device. The website is loaded but with an error. What is occurring?

A.

DNS hijacking attack

A.

DNS hijacking attack

Answers
B.

Endpoint local time is invalid.

B.

Endpoint local time is invalid.

Answers
C.

Certificate is not in trusted roots.

C.

Certificate is not in trusted roots.

Answers
D.

man-m-the-middle attack

D.

man-m-the-middle attack

Answers
Suggested answer: D

Explanation:

A man-in-the-middle attack is a type of cyberattack where an attacker intercepts and alters the communication between two parties who believe they are directly communicating with each other. In this case, the attacker is impersonating mail.google.com and presenting a fake certificate to the endpoint device. The endpoint device detects that the certificate is not issued by a trusted authority and displays an error message. The attacker can then monitor or modify the traffic between the endpoint device and mail.google.com.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, Module 3: Host-Based Analysis, Lesson 3.2: Endpoint Security Technologies

200-201 CBROPS - Cisco, Exam Topics, 3.0 Host-Based Analysis, 3.2 Compare and contrast the functionality of these endpoint security technologies

Cisco Certified CyberOps Associate Overview - Cisco Learning Network, Videos, 3.2 Compare and contrast the functionality of these endpoint security technologies

An analyst is using the SIEM platform and must extract a custom property from a Cisco device and capture the phrase, 'File: Clean.' Which regex must the analyst import?

A.

File: Clean

A.

File: Clean

Answers
B.

^Parent File Clean$

B.

^Parent File Clean$

Answers
C.

File: Clean (.*)

C.

File: Clean (.*)

Answers
D.

^File: Clean$

D.

^File: Clean$

Answers
Suggested answer: A

Explanation:

A regular expression (regex) is a sequence of characters that defines a search pattern for text. A regex can be used to extract custom properties from log messages or events in a SIEM platform. In this case, the regex that matches the phrase ''File: Clean'' exactly is ^File: Clean$. The ^ symbol indicates the beginning of the line and the $ symbol indicates the end of the line. The regex ensures that no other characters are before or after the phrase.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, Module 5: Security Policies and Procedures, Lesson 5.3: Data and Event Analysis

200-201 CBROPS - Cisco, Exam Topics, 5.0 Security Policies and Procedures, 5.3 Analyze data as part of security monitoring activities

Cisco Certified CyberOps Associate Overview - Cisco Learning Network, Videos, 5.3 Analyze data as part of security monitoring activities

What describes the concept of data consistently and readily being accessible for legitimate users?

A.

integrity

A.

integrity

Answers
B.

availability

B.

availability

Answers
C.

accessibility

C.

accessibility

Answers
D.

confidentiality

D.

confidentiality

Answers
Suggested answer: B

Explanation:

Availability is one of the three pillars of the CIA triad, a model that defines the principles of information security. Availability describes the concept of data consistently and readily being accessible for legitimate users. Availability ensures that the network and systems are operational and resilient to disruptions, such as denial-of-service attacks, hardware failures, or natural disasters. Availability also involves maintaining backup and recovery procedures, load balancing, and redundancy mechanisms.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, Module 1: Security Concepts, Lesson 1.1: Security Principles

200-201 CBROPS - Cisco, Exam Topics, 1.0 Security Concepts, 1.1 Explain the CIA triad

Cisco Certified CyberOps Associate Overview - Cisco Learning Network, Videos, 1.1 Explain the CIA triad

Refer to the exhibit.

Which frame numbers contain a file that is extractable via TCP stream within Wireshark?

A.

7,14, and 21

A.

7,14, and 21

Answers
B.

7 and 21

B.

7 and 21

Answers
C.

14,16,18, and 19

C.

14,16,18, and 19

Answers
D.

7 to 21

D.

7 to 21

Answers
Suggested answer: A

Explanation:

The file that is extractable via TCP stream within Wireshark is the one that has the Content-Type header set to application/octet-stream, which indicates binary data. This header is present in frames 7, 14, and 21, which are part of the same TCP stream. The other frames have different Content-Type headers, such as text/html or image/jpeg, which are not extractable as binary files.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.2: Analyze Data from Common TCP/IP Protocols, Topic 3.2.3: HTTP

Refer to the exhibit.

Which stakeholders must be involved when a company workstation is compromised?

A.

Employee 1 Employee 2, Employee 3, Employee 4, Employee 5, Employee 7

A.

Employee 1 Employee 2, Employee 3, Employee 4, Employee 5, Employee 7

Answers
B.

Employee 1, Employee 2, Employee 4, Employee 5

B.

Employee 1, Employee 2, Employee 4, Employee 5

Answers
C.

Employee 4, Employee 6, Employee 7

C.

Employee 4, Employee 6, Employee 7

Answers
D.

Employee 2, Employee 3, Employee 4, Employee 5

D.

Employee 2, Employee 3, Employee 4, Employee 5

Answers
Suggested answer: C

Explanation:

When a company workstation is compromised, the stakeholders that must be involved are the ones who are responsible for the security incident response process. According to the table, these are Employee 4 (Security Operation Center Analyst), Employee 6 (Head of Network and Security Infrastructure Services), and Employee 7 (Technical Director). The other employees have different roles that are not directly related to the incident response process, such as accounting, financial management, or system administration.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.4: Security Monitoring, Topic 1.4.1: Security Operations Center

How does an attack surface differ from an attack vector?

A.

An attack vector recognizes the potential outcomes of an attack, and the attack surface is choosing a method of an attack.

A.

An attack vector recognizes the potential outcomes of an attack, and the attack surface is choosing a method of an attack.

Answers
B.

An attack surface identifies vulnerable parts for an attack, and an attack vector specifies which attacks are feasible to those parts.

B.

An attack surface identifies vulnerable parts for an attack, and an attack vector specifies which attacks are feasible to those parts.

Answers
C.

An attack surface mitigates external vulnerabilities, and an attack vector identifies mitigation techniques and possible workarounds.

C.

An attack surface mitigates external vulnerabilities, and an attack vector identifies mitigation techniques and possible workarounds.

Answers
D.

An attack vector matches components that can be exploited, and an attack surface classifies the potential path for exploitation

D.

An attack vector matches components that can be exploited, and an attack surface classifies the potential path for exploitation

Answers
Suggested answer: B

Explanation:

An attack surface is the sum of all the points where an attacker can try to enter or extract data from an environment. It includes all the hardware, software, network, and human components that are exposed to potential threats. An attack vector is the path or means by which an attacker can exploit a vulnerability in the attack surface. It describes the type, source, and technique of an attack, such as phishing, malware, denial-of-service, etc.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.1: The CIA Triad and Security Concepts, Topic 1.1.3: Threats, Vulnerabilities, and Exploits

How does TOR alter data content during transit?

A.

It spoofs the destination and source information protecting both sides.

A.

It spoofs the destination and source information protecting both sides.

Answers
B.

It encrypts content and destination information over multiple layers.

B.

It encrypts content and destination information over multiple layers.

Answers
C.

It redirects destination traffic through multiple sources avoiding traceability.

C.

It redirects destination traffic through multiple sources avoiding traceability.

Answers
D.

It traverses source traffic through multiple destinations before reaching the receiver

D.

It traverses source traffic through multiple destinations before reaching the receiver

Answers
Suggested answer: B

Explanation:

TOR is a network that enables anonymous communication over the internet by routing the traffic through a series of relays or nodes. TOR alters the data content during transit by encrypting it and the destination information over multiple layers, using a technique called onion routing. Each layer of encryption can only be decrypted by a specific relay in the network, which reveals the next destination. This way, no single relay knows the complete path or the content of the data, making it difficult to trace or monitor the communication.Reference:= Cisco Cybersecurity Operations Fundamentals, Module 2: Security Monitoring, Lesson 2.1: The Network as a Sensor, Topic 2.1.3: Network Data Exfiltration Techniques

Total 331 questions
Go to page: of 34