ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 22

Question list
Search
Search

Related questions











Refer to the exhibit.

A network administrator is investigating suspicious network activity by analyzing captured traffic. An engineer notices abnormal behavior and discovers that the default user agent is present in the headers of requests and data being transmitted What is occurring?

A.

indicators of denial-of-service attack due to the frequency of requests

A.

indicators of denial-of-service attack due to the frequency of requests

Answers
B.

garbage flood attack attacker is sending garbage binary data to open ports

B.

garbage flood attack attacker is sending garbage binary data to open ports

Answers
C.

indicators of data exfiltration HTTP requests must be plain text

C.

indicators of data exfiltration HTTP requests must be plain text

Answers
D.

cache bypassing attack: attacker is sending requests for noncacheable content

D.

cache bypassing attack: attacker is sending requests for noncacheable content

Answers
Suggested answer: D

Explanation:

The presence of a default user agent in the headers of requests and data being transmitted suggests a cache bypassing attack. In this scenario, the attacker is likely requesting noncacheable content to avoid detection by caching mechanisms that could otherwise identify and block malicious traffic.

A company encountered a breach on its web servers using IIS 7 5 Dunng the investigation, an engineer discovered that an attacker read and altered the data on a secure communication using TLS 1 2 and intercepted sensitive information by downgrading a connection to export-grade cryptography. The engineer must mitigate similar incidents in the future and ensure that clients and servers always negotiate with the most secure protocol versions and cryptographic parameters. Which action does the engineer recommend?

A.

Upgrade to TLS v1 3.

A.

Upgrade to TLS v1 3.

Answers
B.

Install the latest IIS version.

B.

Install the latest IIS version.

Answers
C.

Downgrade to TLS 1.1.

C.

Downgrade to TLS 1.1.

Answers
D.

Deploy an intrusion detection system

D.

Deploy an intrusion detection system

Answers
Suggested answer: A

Explanation:

Upgrading to TLS v1.3 is recommended because it eliminates outdated cryptographic functions and reduces the risk of downgrade attacks, which can occur when attackers force connections to use weaker encryption. TLS v1.3 only supports secure cipher suites and algorithms, enhancing the security of communications.

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?

A.

DAC requires explicit authorization for a given user on a given object, and RBAC requires specific conditions.

A.

DAC requires explicit authorization for a given user on a given object, and RBAC requires specific conditions.

Answers
B.

RBAC access is granted when a user meets specific conditions, and in DAC, permissions are applied on user and group levels.

B.

RBAC access is granted when a user meets specific conditions, and in DAC, permissions are applied on user and group levels.

Answers
C.

RBAC is an extended version of DAC where you can add an extra level of authorization based on time.

C.

RBAC is an extended version of DAC where you can add an extra level of authorization based on time.

Answers
D.

DAC administrators pass privileges to users and groups, and in RBAC, permissions are applied to specific groups

D.

DAC administrators pass privileges to users and groups, and in RBAC, permissions are applied to specific groups

Answers
Suggested answer: B

Explanation:

In RBAC, access is based on the roles that users have within an organization, and permissions to perform certain operations are assigned to specific roles. DAC, on the other hand, is a type of access control where the access rights are determined by the owner of the resource or the resource itself.

Which technology prevents end-device to end-device IP traceability?

A.

encryption

A.

encryption

Answers
B.

load balancing

B.

load balancing

Answers
C.

NAT/PAT

C.

NAT/PAT

Answers
D.

tunneling

D.

tunneling

Answers
Suggested answer: C

Explanation:

NAT (Network Address Translation) and PAT (Port Address Translation) are technologies that modify the IP address information in packet headers as they pass through a router or firewall, making it difficult to trace the communication back to the originating end-device.

What are the two differences between stateful and deep packet inspection? (Choose two )

A.

Stateful inspection is capable of TCP state tracking, and deep packet filtering checks only TCP source and destination ports

A.

Stateful inspection is capable of TCP state tracking, and deep packet filtering checks only TCP source and destination ports

Answers
B.

Deep packet inspection is capable of malware blocking, and stateful inspection is not

B.

Deep packet inspection is capable of malware blocking, and stateful inspection is not

Answers
C.

Deep packet inspection operates on Layer 3 and 4. and stateful inspection operates on Layer 3 of the OSI model

C.

Deep packet inspection operates on Layer 3 and 4. and stateful inspection operates on Layer 3 of the OSI model

Answers
D.

Deep packet inspection is capable of TCP state monitoring only, and stateful inspection can inspect TCP and UDP.

D.

Deep packet inspection is capable of TCP state monitoring only, and stateful inspection can inspect TCP and UDP.

Answers
E.

Stateful inspection is capable of packet data inspections, and deep packet inspection is not

E.

Stateful inspection is capable of packet data inspections, and deep packet inspection is not

Answers
Suggested answer: A, B

Explanation:

A: Stateful inspection tracks the state of network connections, such as TCP streams, to determine if a packet is part of an established connection.

B: Deep packet inspection examines the data part (payload) of a packet and can identify, block, or reroute packets with specific types of malware. Stateful inspection does not inspect the payload for malware.

What is the purpose of command and control for network-aware malware?

A.

It contacts a remote server for commands and updates

A.

It contacts a remote server for commands and updates

Answers
B.

It takes over the user account for analysis

B.

It takes over the user account for analysis

Answers
C.

It controls and shuts down services on the infected host.

C.

It controls and shuts down services on the infected host.

Answers
D.

It helps the malware to profile the host

D.

It helps the malware to profile the host

Answers
Suggested answer: A

Explanation:

The purpose of command and control (C&C) for network-aware malware is to allow an attacker to remotely control compromised systems. This includes sending commands to the malware, receiving data from the infected host, and updating the malware to evade detection or enhance its capabilities.

What do host-based firewalls protect workstations from?

A.

zero-day vulnerabilities

A.

zero-day vulnerabilities

Answers
B.

unwanted traffic

B.

unwanted traffic

Answers
C.

malicious web scripts

C.

malicious web scripts

Answers
D.

viruses

D.

viruses

Answers
Suggested answer: B

Explanation:

Host-based firewalls are designed to protect individual workstations from unwanted traffic by filtering incoming and outgoing network communications based on predefined security rules. They can block unauthorized access attempts and prevent potentially harmful traffic from reaching the system.

Refer to exhibit.

An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?

A.

data encapsulation

A.

data encapsulation

Answers
B.

IP fragmentation

B.

IP fragmentation

Answers
C.

code obfuscation

C.

code obfuscation

Answers
D.

data encryption

D.

data encryption

Answers
Suggested answer: D

Explanation:

When analyzing a pcap file, data encryption can pose a significant challenge in terms of visibility. Encrypted data cannot be easily inspected, which means that the analyst may not be able to view the contents of the network packets to detect suspicious activity.

Which two measures are used by the defense-m-depth strategy? (Choose two)

A.

Bridge the single connection into multiple.

A.

Bridge the single connection into multiple.

Answers
B.

Divide the network into parts

B.

Divide the network into parts

Answers
C.

Split packets into pieces.

C.

Split packets into pieces.

Answers
D.

Reduce the load on network devices.

D.

Reduce the load on network devices.

Answers
E.

Implement the patch management process

E.

Implement the patch management process

Answers
Suggested answer: B, E

Explanation:

The defense-in-depth strategy is a layered approach to security that includes multiple defensive measures to protect against threats. Dividing the network into parts (B) helps isolate potential breaches, making it harder for an attacker to move laterally across the network. Implementing the patch management process (E) ensures that systems are up-to-date with the latest security patches, reducing vulnerabilities that attackers could exploit.

Which option describes indicators of attack?

A.

spam emails on an employee workstation

A.

spam emails on an employee workstation

Answers
B.

virus detection by the AV software

B.

virus detection by the AV software

Answers
C.

blocked phishing attempt on a company

C.

blocked phishing attempt on a company

Answers
D.

malware reinfection within a few minutes of removal

D.

malware reinfection within a few minutes of removal

Answers
Suggested answer: D

Explanation:

Indicators of attack (IoAs) are signs that an attack may be in progress or imminent. Malware reinfection within a few minutes of removal (D) is a strong IoA because it suggests that the attacker has a persistent mechanism to redeploy malware, indicating an active compromise of the system.

Total 331 questions
Go to page: of 34