ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

How is attacking a vulnerability categorized?

action on objectives

action on objectives

delivery

delivery

exploitation

exploitation

installation

installation

Suggested answer: C
Explanation:

Attacking a vulnerability is categorized as exploitation, which is the third phase of the cyberattack lifecycle. Exploitation is the process of taking advantage of a vulnerability in a system, application, or network to gain access, escalate privileges, or execute commands. Action on objectives, delivery, and installation are other phases of the cyberattack lifecycle, but they do not involve attacking a vulnerability. Action on objectives is the final phase, where the attacker achieves their goal, such as stealing data, disrupting services, or destroying assets. Delivery is the second phase, where the attacker delivers the malicious payload, such as malware, phishing email, or malicious link, to the target. Installation is the fourth phase, where the attacker installs the malicious payload on the compromised system or network to maintain persistence or spread laterally.Reference:What is a Cyberattack? | IBM,Recognizing the seven stages of a cyber-attack - DNV

asked 07/10/2024
Mahmoud Ismail
38 questions

Question 22

Report Export Collapse

What is a benefit of agent-based protection when compared to agentless protection?

It lowers maintenance costs

It lowers maintenance costs

It provides a centralized platform

It provides a centralized platform

It collects and detects all traffic locally

It collects and detects all traffic locally

It manages numerous devices simultaneously

It manages numerous devices simultaneously

Suggested answer: C
Explanation:

Agent-based protection is a type of endpoint security that uses software agents installed on the devices to monitor and protect them. Agent-based protection can collect and detect all traffic locally, which means it can operate without relying on a network connection or a centralized server. Agent-based protection can also provide more granular and comprehensive visibility and control over the devices.Reference: https://learningnetworkstore.cisco.com/on-demand-e-learning/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-v1.0/CSCU-LP-CBROPS-V1-028093.html (Module 2: Security Concepts, Lesson 2.3: Endpoint Security)

asked 07/10/2024
abdirashid ahmed
37 questions

Question 23

Report Export Collapse

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

decision making

decision making

rapid response

rapid response

data mining

data mining

due diligence

due diligence

Suggested answer: A
Explanation:

Decision making is a principle that guides an analyst to gather information relevant to a security incident to determine the appropriate course of action. Decision making involves identifying the problem, defining the criteria, analyzing the alternatives, and choosing the best solution. Decision making helps an analyst to respond to an incident effectively and efficiently, while minimizing the impact and risk to the organization.Reference: https://learningnetworkstore.cisco.com/on-demand-e-learning/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-v1.0/CSCU-LP-CBROPS-V1-028093.html (Module 3: Security Monitoring, Lesson 3.1: Security Operations Center)

asked 07/10/2024
Swen Leuning
55 questions

Question 24

Report Export Collapse

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

confidentiality, identity, and authorization

confidentiality, identity, and authorization

confidentiality, integrity, and authorization

confidentiality, integrity, and authorization

confidentiality, identity, and availability

confidentiality, identity, and availability

confidentiality, integrity, and availability

confidentiality, integrity, and availability

Suggested answer: D
Explanation:

CIA stands for confidentiality, integrity, and availability, which are the three main objectives of information security. Confidentiality means protecting the information from unauthorized access or disclosure. Integrity means ensuring the information is accurate and consistent, and preventing unauthorized modification or deletion. Availability means ensuring the information and systems are accessible and usable by authorized users when needed.Reference: https://learningnetworkstore.cisco.com/on-demand-e-learning/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-v1.0/CSCU-LP-CBROPS-V1-028093.html (Module 2: Security Concepts, Lesson 2.1: Security Principles)

asked 07/10/2024
Khoi Le
43 questions

Question 25

Report Export Collapse

What is rule-based detection when compared to statistical detection?

proof of a user's identity

proof of a user's identity

proof of a user's action

proof of a user's action

likelihood of user's action

likelihood of user's action

falsification of a user's identity

falsification of a user's identity

Suggested answer: B
Explanation:

Rule-based detection is a type of intrusion detection system (IDS) that uses predefined rules or signatures to identify malicious or suspicious activity. Rule-based detection can provide proof of a user's action, such as an attempt to exploit a known vulnerability or execute a malicious command. Rule-based detection can also provide a high level of accuracy and specificity, but it requires constant updates and maintenance of the rules or signatures.Reference: https://learningnetworkstore.cisco.com/on-demand-e-learning/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-v1.0/CSCU-LP-CBROPS-V1-028093.html (Module 4: Attack Methods, Lesson 4.2: Attack Techniques)

asked 07/10/2024
roberto gaccetta
41 questions

Question 26

Report Export Collapse

A user received a malicious attachment but did not run it. Which category classifies the intrusion?

weaponization

weaponization

reconnaissance

reconnaissance

installation

installation

delivery

delivery

Suggested answer: D
asked 07/10/2024
Matthew Sain
42 questions

Question 27

Report Export Collapse

Which process is used when IPS events are removed to improve data integrity?

data availability

data availability

data normalization

data normalization

data signature

data signature

data protection

data protection

Suggested answer: B
asked 07/10/2024
James Morris
39 questions

Question 28

Report Export Collapse

An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?

sequence numbers

sequence numbers

IP identifier

IP identifier

5-tuple

5-tuple

timestamps

timestamps

Suggested answer: C
asked 07/10/2024
MOHAMED RIAZ MOHAMED IBRAHIM
45 questions

Question 29

Report Export Collapse

What is a difference between SOAR and SIEM?

SOAR platforms are used for threat and vulnerability management, but SIEM applications are not

SOAR platforms are used for threat and vulnerability management, but SIEM applications are not

SIEM applications are used for threat and vulnerability management, but SOAR platforms are not

SIEM applications are used for threat and vulnerability management, but SOAR platforms are not

SOAR receives information from a single platform and delivers it to a SIEM

SOAR receives information from a single platform and delivers it to a SIEM

SIEM receives information from a single platform and delivers it to a SOAR

SIEM receives information from a single platform and delivers it to a SOAR

Suggested answer: A
asked 07/10/2024
Louis Reeves
51 questions

Question 30

Report Export Collapse

What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?

MAC is controlled by the discretion of the owner and DAC is controlled by an administrator

MAC is controlled by the discretion of the owner and DAC is controlled by an administrator

MAC is the strictest of all levels of control and DAC is object-based access

MAC is the strictest of all levels of control and DAC is object-based access

DAC is controlled by the operating system and MAC is controlled by an administrator

DAC is controlled by the operating system and MAC is controlled by an administrator

DAC is the strictest of all levels of control and MAC is object-based access

DAC is the strictest of all levels of control and MAC is object-based access

Suggested answer: B
asked 07/10/2024
OKAN AYDOÄžAN
52 questions
Total 331 questions
Go to page: of 34