ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 24

Question list
Search
Search

Related questions











When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?

A.

full packet capture

A.

full packet capture

Answers
B.

NetFlow data

B.

NetFlow data

Answers
C.

session data

C.

session data

Answers
D.

firewall logs

D.

firewall logs

Answers
Suggested answer: A

Explanation:

Full packet capture provides the complete recording of all the packets that are transmitted over the network. This data is essential for in-depth analysis during an investigation, as it allows investigators to reconstruct the session, observe the content of the traffic, and determine if data exfiltration has occurred.

What is the difference between deep packet inspection and stateful inspection?

A.

Deep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4.

A.

Deep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4.

Answers
B.

Deep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention.

B.

Deep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention.

Answers
C.

Stateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention.

C.

Stateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention.

Answers
D.

Stateful inspection verifies data at the transport layer and deep packet inspection verifies data at the application layer

D.

Stateful inspection verifies data at the transport layer and deep packet inspection verifies data at the application layer

Answers
Suggested answer: A

Explanation:

Deep packet inspection (DPI) analyzes the data part (and possibly also the header) of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions, or defined criteria to decide whether the packet may pass or if it needs to be routed to a different destination. Stateful inspection, on the other hand, tracks the state of active connections and determines which network packets to allow through the firewall. While stateful inspection tracks the state of connections (Layer 4 - transport layer), DPI goes further by examining the payload of the packet (Layer 7 - application layer).

What is obtained using NetFlow?

A.

session data

A.

session data

Answers
B.

application logs

B.

application logs

Answers
C.

network downtime report

C.

network downtime report

Answers
D.

full packet capture

D.

full packet capture

Answers
Suggested answer: A

Explanation:

NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network flow. It provides valuable data about the network sessions occurring within the network, such as source and destination IP addresses, port numbers, and protocols used. This session data is useful for understanding traffic patterns, volume, and usage.

How does statistical detection differ from rule-based detection?

A.

Statistical detection involves the evaluation of events, and rule-based detection requires an evaluated set of events to function.

A.

Statistical detection involves the evaluation of events, and rule-based detection requires an evaluated set of events to function.

Answers
B.

Statistical detection defines legitimate data over time, and rule-based detection works on a predefined set of rules

B.

Statistical detection defines legitimate data over time, and rule-based detection works on a predefined set of rules

Answers
C.

Rule-based detection involves the evaluation of events, and statistical detection requires an evaluated set of events to function Rule-based detection defines

C.

Rule-based detection involves the evaluation of events, and statistical detection requires an evaluated set of events to function Rule-based detection defines

Answers
D.

legitimate data over a period of time, and statistical detection works on a predefined set of rules

D.

legitimate data over a period of time, and statistical detection works on a predefined set of rules

Answers
Suggested answer: B

Explanation:

Statistical detection relies on analyzing data over time to identify patterns and anomalies, without predefined rules. It uses algorithms and statistical models to determine normal behavior and identify deviations. Rule-based detection uses predefined rules or patterns to identify known threats or vulnerabilities, often based on signatures or behaviors associated with specific attacks.

Refer to the exhibit.

What must be interpreted from this packet capture?

A.

IP address 192.168.88 12 is communicating with 192 168 88 149 with a source port 74 to destination port 49098 using TCP protocol

A.

IP address 192.168.88 12 is communicating with 192 168 88 149 with a source port 74 to destination port 49098 using TCP protocol

Answers
B.

IP address 192.168.88.12 is communicating with 192 168 88 149 with a source port 49098 to destination port 80 using TCP protocol.

B.

IP address 192.168.88.12 is communicating with 192 168 88 149 with a source port 49098 to destination port 80 using TCP protocol.

Answers
C.

IP address 192.168.88.149 is communicating with 192.168 88.12 with a source port 80 to destination port 49098 using TCP protocol.

C.

IP address 192.168.88.149 is communicating with 192.168 88.12 with a source port 80 to destination port 49098 using TCP protocol.

Answers
D.

IP address 192.168.88.149 is communicating with 192.168.88.12 with a source port 49098 to destination port 80 using TCP protocol.

D.

IP address 192.168.88.149 is communicating with 192.168.88.12 with a source port 49098 to destination port 80 using TCP protocol.

Answers
Suggested answer: C

Explanation:

The packet capture shows that IP address 192.168.88.149, using source port 80 (common for HTTP traffic), initiated communication with IP address 192.168.88.12 at destination port 49098, using the TCP protocol, indicating a typical client-server interaction over the web.

Refer to the exhibit.

Which field contains DNS header information if the payload is a query or a response?

A.

Z

A.

Z

Answers
B.

ID

B.

ID

Answers
C.

TC

C.

TC

Answers
D.

QR

D.

QR

Answers
Suggested answer: D

Explanation:

The QR field in the DNS header specifies whether the message is a query (QR=0) or a response (QR=1). This bit is set to 0 for query messages and is set to 1 for response messages, allowing the recipient to distinguish between the two.

Refer to the exhibit.

What is occurring?

A.

ARP flood

A.

ARP flood

Answers
B.

DNS amplification

B.

DNS amplification

Answers
C.

ARP poisoning

C.

ARP poisoning

Answers
D.

DNS tunneling

D.

DNS tunneling

Answers
Suggested answer: B

Explanation:

DNS amplification is a type of Distributed Denial of Service (DDoS) attack where an attacker uses publicly accessible open DNS servers to flood a target with DNS response traffic. The goal is to overwhelm the target with traffic, causing a denial of service.

What is the difference between vulnerability and risk?

A.

A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.

A.

A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.

Answers
B.

A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself

B.

A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself

Answers
C.

A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.

C.

A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.

Answers
D.

A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit

D.

A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit

Answers
Suggested answer: C

Explanation:

Vulnerability refers to a weakness or flaw in a system that can be exploited by threats. Risk, on the other hand, is the potential for loss or damage when a threat exploits a vulnerability.The risk is essentially the impact or consequence of a vulnerability being exploited

An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?

A.

phishing email

A.

phishing email

Answers
B.

sender

B.

sender

Answers
C.

HR

C.

HR

Answers
D.

receiver

D.

receiver

Answers
Suggested answer: B

Explanation:

In the context of phishing emails, the threat actor is the entity that is responsible for initiating the threat, which in this case is the sender of the phishing emails.The sender is impersonating the HR department to deceive the receiver into believing that the emails are legitimate

Refer to the exhibit.

A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?

A.

indirect evidence

A.

indirect evidence

Answers
B.

best evidence

B.

best evidence

Answers
C.

corroborative evidence

C.

corroborative evidence

Answers
D.

direct evidence

D.

direct evidence

Answers
Suggested answer: A

Explanation:

The file in question, which contains logs of unsuccessful login attempts from an unknown IP address, is considered indirect evidence. It suggests that there may have been an attempt to gain unauthorized access, but it does not directly prove who was responsible for the attempts. Indirect evidence can be used to support other evidence that may lead to a direct identification of the threat actor.Reference: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) and other Cisco cybersecurity resources provide information on how to analyze and categorize different types of evidence in the context of security incidents.

Total 331 questions
Go to page: of 34