ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Related questions











Which type of data must an engineer capture to analyze payload and header information?

A.

frame check sequence

A.

frame check sequence

Answers
B.

alert data

B.

alert data

Answers
C.

full packet

C.

full packet

Answers
D.

session logs

D.

session logs

Answers
Suggested answer: C

Explanation:

To analyze both payload and header information, an engineer must capture the full packet data.This includes all protocol and payload information for the traffic, allowing for a comprehensive analysis of the data being transmitted5678.Reference:: Full packet capture is a common practice in network monitoring and security, as it provides detailed insights into the data transmitted over the network, including both payload and header information

What are two differences between tampered disk images and untampered disk images'? (Choose two.)

A.

Tampered Images are used in a security investigation process

A.

Tampered Images are used in a security investigation process

Answers
B.

Untampered images can be used as law enforcement evidence.

B.

Untampered images can be used as law enforcement evidence.

Answers
C.

The image is untampered if the existing stored hash matches the computed one

C.

The image is untampered if the existing stored hash matches the computed one

Answers
D.

The image is tampered if the stored hash and the computed hash are identical

D.

The image is tampered if the stored hash and the computed hash are identical

Answers
E.

Tampered images are used as an element for the root cause analysis report

E.

Tampered images are used as an element for the root cause analysis report

Answers
Suggested answer: C, E

Explanation:

An untampered disk image is one that has not been altered since its creation. This is verified by comparing the stored hash of the image at the time of creation with a newly computed hash; if they match, the image is considered untampered.Tampered images, on the other hand, may be used during the root cause analysis process to understand how and what was altered12.Reference:: The differences between tampered and untampered disk images are discussed in cybersecurity literature, including Cisco's certification guides, which explain the importance of hash matching for verifying the integrity of disk images

According to CVSS, what is a description of the attack vector score?

A.

The metric score will be larger when it is easier to physically touch or manipulate the vulnerable component

A.

The metric score will be larger when it is easier to physically touch or manipulate the vulnerable component

Answers
B.

It depends on how many physical and logical manipulations are possible on a vulnerable component

B.

It depends on how many physical and logical manipulations are possible on a vulnerable component

Answers
C.

The metric score will be larger when a remote attack is more likely.

C.

The metric score will be larger when a remote attack is more likely.

Answers
D.

It depends on how far away the attacker is located and the vulnerable component

D.

It depends on how far away the attacker is located and the vulnerable component

Answers
Suggested answer: C

Explanation:

The attack vector score in the Common Vulnerability Scoring System (CVSS) reflects how a vulnerability can be exploited.A higher score is given when the attack can be conducted remotely, making it easier for an attacker to exploit the vulnerability without physical access to the vulnerable component3.Reference:: The CVSS specification document provides a detailed explanation of how the attack vector score is determined, emphasizing the impact of the ease of exploitation on the score

Refer to the exhibit.

A suspicious IP address is tagged by Threat Intelligence as a brute-force attempt source After the attacker produces many of failed login entries, it successfully compromises the account. Which stakeholder is responsible for the incident response detection step?

A.

employee 5

A.

employee 5

Answers
B.

employee 3

B.

employee 3

Answers
C.

employee 4

C.

employee 4

Answers
D.

employee 2

D.

employee 2

Answers
Suggested answer: C

Explanation:

In the context of incident response, the detection step involves identifying potential security incidents. The Security Operation Center (SOC) Analyst, which in this case is Employee 4, is typically responsible for monitoring and analyzing security alerts to detect suspicious activities such as brute-force attempts. Therefore, Employee 4 would be the stakeholder responsible for the incident response detection step.Reference: The role of a SOC Analyst in incident response is outlined in cybersecurity frameworks and best practices, which describe the responsibilities of various stakeholders in detecting and responding to security incidents.

Which type of attack is a blank email with the subject 'price deduction' that contains a malicious attachment?

A.

man-in-the-middle attack

A.

man-in-the-middle attack

Answers
B.

smishing

B.

smishing

Answers
C.

phishing attack

C.

phishing attack

Answers
D.

integrity violation

D.

integrity violation

Answers
Suggested answer: C

Explanation:

A phishing attack often involves sending emails that appear to be from reputable sources with the goal of inducing individuals to reveal personal information, such as passwords and credit card numbers.In this case, the email with the subject ''price deduction'' containing a malicious attachment is designed to trick the recipient into opening the attachment, which can then execute harmful software on their device

What matches the regular expression c(rgr)+e?

A.

crgrrgre

A.

crgrrgre

Answers
B.

np+e

B.

np+e

Answers
C.

c(rgr)e

C.

c(rgr)e

Answers
D.

ce

D.

ce

Answers
Suggested answer: A

Explanation:

The regular expressionc(rgr)+ematches strings where ''rgr'' occurs one or more times between ''c'' and ''e''. The string ''crgrrgre'' fits this pattern as it has the sequence ''rgr'' repeated twice between ''c'' and ''e''.The plus sign (+) in the regular expression indicates that the preceding element must appear one or more times for a match to occur

Which evasion method involves performing actions slower than normal to prevent detection?

A.

timing attack

A.

timing attack

Answers
B.

traffic fragmentation

B.

traffic fragmentation

Answers
C.

resource exhaustion

C.

resource exhaustion

Answers
D.

tunneling

D.

tunneling

Answers
Suggested answer: B

Explanation:

Traffic fragmentation is an evasion technique where an attacker splits malicious payloads into smaller packets. This can help avoid detection since some security systems may not reassemble these packets to inspect the complete payload.

What is a difference between a threat and a risk?

A.

A threat is a sum of risks and a risk itself represents a specific danger toward the asset

A.

A threat is a sum of risks and a risk itself represents a specific danger toward the asset

Answers
B.

A threat can be people property, or information, and risk is a probability by which these threats may bring harm to the business

B.

A threat can be people property, or information, and risk is a probability by which these threats may bring harm to the business

Answers
C.

A risk is a flaw or hole in security, and a threat is what is being used against that flaw

C.

A risk is a flaw or hole in security, and a threat is what is being used against that flaw

Answers
D.

A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against

D.

A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against

Answers
Suggested answer: D

Explanation:

In cybersecurity, a threat is any potential malicious attack or event that can harm an organization, while a risk is the potential damage or loss that could occur if a threat exploits a vulnerability. Therefore, risk is considered the intersection of threats and vulnerabilities, representing the likelihood and impact of a threat materializing.

How can TOR impact data visibility inside an organization?

A.

increases data integrity

A.

increases data integrity

Answers
B.

increases security

B.

increases security

Answers
C.

decreases visibility

C.

decreases visibility

Answers
D.

no impact

D.

no impact

Answers
Suggested answer: C

Explanation:

TOR, or The Onion Router, is designed to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.Using TOR makes it more difficult to trace internet activity, including ''visits to Web sites, online posts, instant messages, and other communication forms,'' back to the user1. It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their internet activities unmonitored. Within an organization, the use of TOR can decrease visibility into data traffic because it encrypts the data multiple times and routes it through a series of servers operated by volunteers around the globe.This makes network monitoring and data visibility challenging for cybersecurity professionals within the organization.Reference:: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

An engineer is working on a ticket for an incident from the incident management team A week ago. an external web application was targeted by a DDoS attack Server resources were exhausted and after two hours it crashed. An engineer was able to identify the attacker and technique used Three hours after the attack, the server was restored and the engineer recommended implementing mitigation by Blackhole filtering and transferred the incident ticket back to the IR team According to NIST SP800-61, at which phase of the incident response did the engineer finish work?

A.

preparation

A.

preparation

Answers
B.

post-incident activity

B.

post-incident activity

Answers
C.

containment eradication and recovery

C.

containment eradication and recovery

Answers
D.

detection and analysis

D.

detection and analysis

Answers
Suggested answer: C

Explanation:

According to NIST SP800-61, the incident response phase called ''Containment, Eradication, and Recovery'' involves containing the incident, eradicating the threat, and recovering from the incident2. In the scenario described, the engineer worked on containing the DDoS attack by identifying the attacker and the technique used, which is part of the containment process. The recommendation to implement Blackhole filtering is part of the eradication process, where measures are taken to prevent the attack from happening again. Finally, restoring the server is part of the recovery process, where normal operations are resumed.Therefore, the engineer finished work during the ''Containment, Eradication, and Recovery'' phase.Reference:: NIST SP800-61 Computer Security Incident Handling Guide2.

Total 331 questions
Go to page: of 34