ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Why is HTTPS traffic difficult to screen?

A.

HTTPS is used internally and screening traffic (or external parties is hard due to isolation.

A.

HTTPS is used internally and screening traffic (or external parties is hard due to isolation.

Answers
B.

The communication is encrypted and the data in transit is secured.

B.

The communication is encrypted and the data in transit is secured.

Answers
C.

Digital certificates secure the session, and the data is sent at random intervals.

C.

Digital certificates secure the session, and the data is sent at random intervals.

Answers
D.

Traffic is tunneled to a specific destination and is inaccessible to others except for the receiver.

D.

Traffic is tunneled to a specific destination and is inaccessible to others except for the receiver.

Answers
Suggested answer: B

Explanation:

HTTPS traffic is difficult to screen because it is encrypted using the SSL/TLS protocol, which secures the data in transit between the client and the server. This encryption ensures that any intercepted traffic cannot be easily read or tampered with by third parties.Screening or inspecting this encrypted traffic would require decrypting it, which poses significant challenges and potential security risks12.

The concept of HTTPS and its implications on traffic screening are discussed in various cybersecurity resources, including Cisco's cybersecurity training materials3.

Cloudflare provides an explanation of HTTPS inspection and the challenges associated with it

Refer to the exhibit.

An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?

A.

Win32.polip.a.exe is an executable file and should be flagged as malicious.

A.

Win32.polip.a.exe is an executable file and should be flagged as malicious.

Answers
B.

The file is clean and does not represent a risk.

B.

The file is clean and does not represent a risk.

Answers
C.

Cuckoo cleaned the malicious file and prepared it for usage.

C.

Cuckoo cleaned the malicious file and prepared it for usage.

Answers
D.

MD5 of the file was not identified as malicious.

D.

MD5 of the file was not identified as malicious.

Answers
Suggested answer: A

Explanation:

The Cuckoo report indicates that the file is a PE32 executable for MS Windows, which is typically an executable file format. The presence of the watermark ''CHINESEDUMPS'' and the detection ratio from VirusTotal suggest that the file is recognized by multiple antivirus engines as potentially harmful. This aligns with option A, suggesting that the file, named Win32.polip.a.exe, should be considered malicious and flagged accordingly.

Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)

A.

detection and analysis

A.

detection and analysis

Answers
B.

post-incident activity

B.

post-incident activity

Answers
C.

vulnerability scoring

C.

vulnerability scoring

Answers
D.

vulnerability management

D.

vulnerability management

Answers
E.

risk assessment

E.

risk assessment

Answers
Suggested answer: A, B

Explanation:

NIST SP 800-61 r2 outlines a structured incident handling lifecycle composed of four phases: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident Activity. Detection and Analysis involve identifying and investigating incidents, while Post-Incident Activity focuses on lessons learned and evidence retention for future reference.

Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?

A.

Biba

A.

Biba

Answers
B.

Object-capability

B.

Object-capability

Answers
C.

Take-Grant

C.

Take-Grant

Answers
D.

Zero Trust

D.

Zero Trust

Answers
Suggested answer: D

Explanation:

The Zero Trust security model operates on the principle that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. It emphasizes continuous monitoring, validation, and least-privilege access to minimize exposure to sensitive parts of the network.

An employee received an email from a colleague's address asking for the password for the domain controller. The employee noticed a missing letter within the sender's address. What does this incident describe?

A.

brute-force attack

A.

brute-force attack

Answers
B.

insider attack

B.

insider attack

Answers
C.

shoulder surfing

C.

shoulder surfing

Answers
D.

social engineering

D.

social engineering

Answers
Suggested answer: D

Explanation:

Social engineering is a tactic used by attackers to manipulate individuals into divulging confidential information, such as passwords. In this scenario, the attacker is impersonating a colleague by using a similar email address with a missing letter, attempting to trick the employee into revealing sensitive information.

What is the difference between indicator of attack (loA) and indicators of compromise (loC)?

A.

loA is the evidence that a security breach has occurred, and loC allows organizations to act before the vulnerability can be exploited.

A.

loA is the evidence that a security breach has occurred, and loC allows organizations to act before the vulnerability can be exploited.

Answers
B.

loA refers to the individual responsible for the security breach, and loC refers to the resulting loss.

B.

loA refers to the individual responsible for the security breach, and loC refers to the resulting loss.

Answers
C.

loC is the evidence that a security breach has occurred, and loA allows organizations to act before the vulnerability can be exploited.

C.

loC is the evidence that a security breach has occurred, and loA allows organizations to act before the vulnerability can be exploited.

Answers
D.

loC refers to the individual responsible for the security breach, and loA refers to the resulting loss.

D.

loC refers to the individual responsible for the security breach, and loA refers to the resulting loss.

Answers
Suggested answer: C

Explanation:

Indicators of Compromise (IoC) are pieces of forensic data, such as system log entries or files, that suggest an intrusion may have occurred. Indicators of Attack (IoA) are signs that an attack may be underway, allowing organizations to take action before any potential breach occurs.

Refer to the exhibit.

An attacker scanned the server using Nmap. What did the attacker obtain from this scan?

A.

Identified a firewall device preventing the pert state from being returned.

A.

Identified a firewall device preventing the pert state from being returned.

Answers
B.

Identified open SMB ports on the server

B.

Identified open SMB ports on the server

Answers
C.

Gathered information on processes running on the server

C.

Gathered information on processes running on the server

Answers
D.

Gathered a list of Active Directory users

D.

Gathered a list of Active Directory users

Answers
Suggested answer: B

Explanation:

The Nmap scan results show that several ports, including ftp (21/tcp), ssh (22/tcp), telnet (23/tcp), smtp (25/tcp), and http (80/tcp), are listed as ''filtered''. This typically indicates that a firewall is filtering the traffic to these ports, making it impossible to determine whether they are open without further investigation. However, the question specifically asks about SMB ports, which are not shown in the provided Nmap scan results. Therefore, based on the information given, we cannot confirm that the attacker identified open SMB ports on the server. The correct answer would require additional evidence not present in the scan results.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course materials and official Cisco documentation provide insights into interpreting Nmap scan results and identifying port states.These resources can be found at the Cisco Learning Network Store and Cisco's official training and certifications webpage

An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison

The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path then locked for a corresponding registry in the registry editor The engineer enabled 'Audiosrv' in task manager and put it on auto start and the problem was solved Which two components of the OS did the engineer touch? (Choose two)

A.

permissions

A.

permissions

Answers
B.

PowerShell logs

B.

PowerShell logs

Answers
C.

service

C.

service

Answers
D.

MBR

D.

MBR

Answers
E.

process and thread

E.

process and thread

Answers
Suggested answer: C, E

Explanation:

The engineer engaged with theservicecomponent by enabling ''Audiosrv,'' which is the Windows Audio Service responsible for managing audio for Windows-based programs. By setting it to auto-start, the engineer ensured that the service would run automatically upon system startup. Additionally, the engineer interacted withprocess and threadmanagement by using the Task Manager to modify the behavior of the ''Audiosrv'' service.

During which phase of the forensic process are tools and techniques used to extract information from the collected data?

A.

investigation

A.

investigation

Answers
B.

examination

B.

examination

Answers
C.

reporting

C.

reporting

Answers
D.

collection

D.

collection

Answers
Suggested answer: B

Explanation:

During theexaminationphase of the forensic process, digital forensic investigators use various tools and techniques to extract and analyze information from the collected data. This phase involves detailed scrutiny of the data to uncover relevant evidence and is critical for the success of the forensic investigation.

Which attack method is being used when an attacker tries to compromise a network with an authentication system that uses only 4-digit numeric passwords and no username?

A.

SQL injection

A.

SQL injection

Answers
B.

dictionary

B.

dictionary

Answers
C.

replay

C.

replay

Answers
D.

cross-site scripting

D.

cross-site scripting

Answers
Suggested answer: B

Explanation:

A dictionary attack is a method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password. In the context of an authentication system that uses only 4-digit numeric passwords, a dictionary attack would involve trying all possible combinations of 4-digit numbers until the correct one is found.

Total 331 questions
Go to page: of 34