ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 25

Question list
Search
Search

Related questions











A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does to this type of event belong?

A.

weaponization

A.

weaponization

Answers
B.

delivery

B.

delivery

Answers
C.

exploitation

C.

exploitation

Answers
D.

reconnaissance

D.

reconnaissance

Answers
Suggested answer: B

Explanation:

The delivery phase of the Cyber Kill Chain model involves the transmission of the weapon to the targeted environment. In the case of a spear-phishing email, the delivery is the act of sending the email to the user.The email itself is the weapon, designed to exploit the recipient's trust to cause a breach

According to the NIST SP 800-86. which two types of data are considered volatile? (Choose two.)

A.

swap files

A.

swap files

Answers
B.

temporary files

B.

temporary files

Answers
C.

login sessions

C.

login sessions

Answers
D.

dump files

D.

dump files

Answers
E.

free space

E.

free space

Answers
Suggested answer: A, C

Explanation:

Volatile data is information that is stored in memory or other temporary storage that is lost when the power is turned off or lost.According to NIST SP 800-86, login sessions and swap files are considered volatile because they exist in the system's memory and can be lost or changed rapidly

Refer to the exhibit.

An engineer is reviewing a Cuckoo report of a file. What must the engineer interpret from the report?

A.

The file will appear legitimate by evading signature-based detection.

A.

The file will appear legitimate by evading signature-based detection.

Answers
B.

The file will not execute its behavior in a sandbox environment to avoid detection.

B.

The file will not execute its behavior in a sandbox environment to avoid detection.

Answers
C.

The file will insert itself into an application and execute when the application is run.

C.

The file will insert itself into an application and execute when the application is run.

Answers
D.

The file will monitor user activity and send the information to an outside source.

D.

The file will monitor user activity and send the information to an outside source.

Answers
Suggested answer: B

Explanation:

The Cuckoo report indicates that the file has been identified by Yara rules as being capable of detecting a sandbox environment, which is a security mechanism for isolating and analyzing suspicious code. The presence of the ''vmdetect'' and ''anti_dog'' Yara rules suggests that the file may have mechanisms to avoid executing its malicious behavior when it detects that it is being analyzed in a sandbox. This is a common evasion technique used by malware to prevent detection and analysis by security researchers or automated systems.

What is the difference between deep packet inspection and stateful inspection?

A.

Stateful inspection verifies contents at Layer 4. and deep packet inspection verifies connection at Layer 7.

A.

Stateful inspection verifies contents at Layer 4. and deep packet inspection verifies connection at Layer 7.

Answers
B.

Stateful inspection is more secure than deep packet inspection on Layer 7.

B.

Stateful inspection is more secure than deep packet inspection on Layer 7.

Answers
C.

Deep packet inspection is more secure than stateful inspection on Layer 4.

C.

Deep packet inspection is more secure than stateful inspection on Layer 4.

Answers
D.

Deep packet inspection allows visibility on Layer 7, and stateful inspection allows visibility on Layer 4.

D.

Deep packet inspection allows visibility on Layer 7, and stateful inspection allows visibility on Layer 4.

Answers
Suggested answer: C

Explanation:

Deep packet inspection (DPI) is a form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions, or defined criteria to decide whether the packet may pass or if it needs to be routed to a different destination, or, for the purpose of collecting statistical information. It is a form of filtering employed at the security layer level of the OSI model. Stateful inspection, on the other hand, is a firewall technology that monitors the state of active connections and determines which network packets to allow through the firewall. Stateful inspection has largely replaced older technologies that were static and examined packets in isolation. Therefore, DPI is considered more secure because it examines the contents of the packets at Layer 7 (the application layer), while stateful inspection typically works up to Layer 4 (the transport layer).

What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?

A.

central key management server

A.

central key management server

Answers
B.

web of trust

B.

web of trust

Answers
C.

trusted certificate authorities

C.

trusted certificate authorities

Answers
D.

registration authority data

D.

registration authority data

Answers
Suggested answer: C

Explanation:

In the context of public key infrastructure (PKI), a trusted certificate authority (CA) is responsible for issuing digital certificates that verify a digital entity's identity on the internet. The CA acts as a trusted third party between the user (in this case, tom0411976943) and the recipient (dan1968754032), ensuring that the public keys are indeed who they claim to be. The CA verifies the identity of the users and then issues a certificate containing the public key and a variety of other identification information. The trusted CA can then vouch for the authenticity of each user to the other.

Which tool gives the ability to see session data in real time?

A.

tcpdstat

A.

tcpdstat

Answers
B.

trafdump

B.

trafdump

Answers
C.

tcptrace

C.

tcptrace

Answers
D.

trafshow

D.

trafshow

Answers
Suggested answer: D

Explanation:

: Trafshow is a network monitoring tool that provides real-time monitoring of network traffic. It displays the current connections and the amount of data being transferred over those connections. It is particularly useful in a Security Operations Center (SOC) for identifying unusual traffic patterns or connections that may indicate a security incident.

What is a description of a social engineering attack?

A.

fake offer for free music download to trick the user into providing sensitive data

A.

fake offer for free music download to trick the user into providing sensitive data

Answers
B.

package deliberately sent to the wrong receiver to advertise a new product

B.

package deliberately sent to the wrong receiver to advertise a new product

Answers
C.

mistakenly received valuable order destined for another person and hidden on purpose

C.

mistakenly received valuable order destined for another person and hidden on purpose

Answers
D.

email offering last-minute deals on various vacations around the world with a due date and a counter

D.

email offering last-minute deals on various vacations around the world with a due date and a counter

Answers
Suggested answer: A

Explanation:

Social engineering attacks involve manipulating individuals into divulging confidential information or performing actions that compromise security. The fake offer for a free music download is a classic example of social engineering, where attackers lure users with a tempting offer to trick them into providing personal information or downloading malware.

What describes a buffer overflow attack?

A.

injecting new commands into existing buffers

A.

injecting new commands into existing buffers

Answers
B.

fetching data from memory buffer registers

B.

fetching data from memory buffer registers

Answers
C.

overloading a predefined amount of memory

C.

overloading a predefined amount of memory

Answers
D.

suppressing the buffers in a process

D.

suppressing the buffers in a process

Answers
Suggested answer: C

Explanation:

A buffer overflow attack occurs when more data is written to a buffer than it is designed to hold. This excess data can overwrite adjacent memory locations, leading to the execution of malicious code or crashing the system. Buffer overflows are a common vulnerability that attackers exploit to gain unauthorized access to systems.

Which are two denial-of-service attacks? (Choose two.)

A.

TCP connections

A.

TCP connections

Answers
B.

ping of death

B.

ping of death

Answers
C.

man-in-the-middle

C.

man-in-the-middle

Answers
D.

code-red

D.

code-red

Answers
E.

UDP flooding

E.

UDP flooding

Answers
Suggested answer: B, E

Explanation:

Theping of deathis a type of attack that involves sending oversized or malformed packets using the ICMP protocol to crash, freeze, or reboot the target system1.

UDP floodingis an attack method that sends a large number of User Datagram Protocol (UDP) packets to random ports on a remote host, causing the host to repeatedly check for the application listening at that port, and (when no application is found) reply with an ICMP Destination Unreachable packet.This process can saturate the network and the resources of the host, leading to denial of service2.

Cloudflare's explanation of common DoS attacks1.

Wikipedia's description of denial-of-service attack methods

Refer to the exhibit. Where is the executable file?

A.

info

A.

info

Answers
B.

tags

B.

tags

Answers
C.

MIME

C.

MIME

Answers
D.

name

D.

name

Answers
Suggested answer: D

Explanation:

The executable file is identified in the ''name'' section of the exhibit, which lists the file name ''VAC-Bypass-Loader.exe''. This indicates that the file is an executable, as denoted by the ''.exe'' extension commonly associated with executable files in Windows operating systems.

Total 331 questions
Go to page: of 34