ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 32

Question list
Search
Search

Related questions











A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?

A.

DNS hijacking

A.

DNS hijacking

Answers
B.

DNS tunneling

B.

DNS tunneling

Answers
C.

DNS flooding

C.

DNS flooding

Answers
D.

DNS amplification

D.

DNS amplification

Answers
Suggested answer: D

Explanation:

The attack described is a DNS amplification attack. It involves infected endpoints sending DNS requests with spoofed IP addresses to external DNS servers. The DNS servers then send large responses to the spoofed addresses, which are actually the targets of the attack. This can result in a significant amount of traffic being directed at the target, overwhelming their network resources. DNS amplification is a type of Distributed Denial of Service (DDoS) attack that leverages the DNS protocol to amplify the attack traffic.

Which items is an end-point application greylist used?

A.

Items that have been established as malicious

A.

Items that have been established as malicious

Answers
B.

Items that have been established as authorized

B.

Items that have been established as authorized

Answers
C.

Items that have been installed with a baseline

C.

Items that have been installed with a baseline

Answers
D.

Items before being established as harmful or malicious

D.

Items before being established as harmful or malicious

Answers
Suggested answer: D

Explanation:

A greylist in endpoint applications refers to a list of items that are not yet classified as either good (whitelisted) or bad (blacklisted).

The primary function of a greylist is to hold applications, processes, or files that are under observation due to their unknown status.

These items are neither trusted nor immediately flagged as harmful, allowing security teams to monitor them closely for any suspicious behavior.

By placing items on a greylist, security operations can prevent potential threats without disrupting legitimate processes, awaiting further analysis to determine their true nature.

Cisco Cybersecurity Operations Fundamentals

Endpoint Security Best Practices

Greylisting Concepts in Cybersecurity

Which type of data is used to detect anomalies in the network?

A.

statistical data

A.

statistical data

Answers
B.

alert data

B.

alert data

Answers
C.

transaction data

C.

transaction data

Answers
D.

metadata

D.

metadata

Answers
Suggested answer: A

Explanation:

Statistical data is crucial for detecting anomalies within a network because it provides a baseline of normal behavior.

Anomaly detection involves comparing current network data against historical statistical data to identify deviations from expected patterns.

This method helps in identifying unusual activities that could signify a security threat, such as unusual login attempts, data transfers, or access patterns.

Statistical data analysis tools use metrics such as mean, variance, and standard deviation to flag anomalies, aiding in proactive threat detection.

Cisco Cybersecurity Operations Fundamentals

Network Anomaly Detection Techniques

Statistical Methods in Cybersecurity

An engineer must investigate suspicious connections. Data has been gathered using a tcpdump command on a Linux device and saved as sandboxmatware2022-12-22.pcaps file. The engineer is trying to open the tcpdump in the Wireshark tool. What is the expected result?

A.

The tool does not support Linux.

A.

The tool does not support Linux.

Answers
B.

The file is opened.

B.

The file is opened.

Answers
C.

The file has an incorrect extension.

C.

The file has an incorrect extension.

Answers
D.

The file does not support the'-' character.

D.

The file does not support the'-' character.

Answers
Suggested answer: B

Explanation:

Wireshark is a widely used network protocol analyzer that supports various capture file formats, including those generated by tcpdump.

The .pcap extension is a standard format for packet capture files and is fully supported by Wireshark.

The file extension or the inclusion of characters such as '-' in the file name does not impact Wireshark's ability to open and read the file.

When the engineer opens the sandboxmatware2022-12-22.pcaps file in Wireshark, the tool will read the packet capture data, allowing for detailed analysis of network traffic.

Cisco Cybersecurity Operations Fundamentals

Wireshark User Guide

tcpdump and libpcap Documentation

Refer to the exhibit.

What does this Cuckoo sandbox report indicate?

A.

The file is spyware.

A.

The file is spyware.

Answers
B.

The file will open unsecure ports when executed.

B.

The file will open unsecure ports when executed.

Answers
C.

The file will open a command interpreter when executed.

C.

The file will open a command interpreter when executed.

Answers
D.

The file is ransomware.

D.

The file is ransomware.

Answers
Suggested answer: C

Explanation:

The Cuckoo sandbox report shows the analysis results of a file named 'VirusShare_fc1937c1aa536b3744ebfb1716fd5f4d'.

The file type is identified as a PE32 executable for MS Windows.

The 'Yara' section indicates that the file contains shellcode, which matches specific shellcode byte patterns.

Shellcode typically indicates that the file will execute a payload, often used to open a command interpreter or execute commands directly.

Additionally, the antivirus result shows that the file was identified as containing a trojan (Trojan.Generic.7654828), which is consistent with behaviors such as opening a command interpreter for malicious purposes.

Cuckoo Sandbox Documentation

Analysis of Shellcode Behavior

Understanding Trojan Malware Functionality

A security engineer must protect the company from known issues that trigger adware. Recently new incident has been raised that could harm the system. Which security concepts are present in this scenario?

A.

exploit and patching

A.

exploit and patching

Answers
B.

risk and evidence

B.

risk and evidence

Answers
C.

analysis and remediation

C.

analysis and remediation

Answers
D.

vulnerability and threat

D.

vulnerability and threat

Answers
Suggested answer: D

Explanation:

The security scenario involves protecting the company from known issues that trigger adware and addressing a recent incident that could harm the system.

This scenario involves identifying vulnerabilities (weaknesses in the system that can be exploited) and threats (potential harm that can exploit these vulnerabilities).

A vulnerability is an inherent flaw in the system, while a threat is an event or condition that has the potential to exploit the vulnerability.

The security engineer needs to assess both the vulnerabilities present and the threats that could exploit these vulnerabilities to implement effective protection measures.

Cisco Cybersecurity Operations Fundamentals

Concepts of Vulnerability and Threat in Cybersecurity

Best Practices in Vulnerability Management

An engineer configured regular expression ''.''\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1 .[01]' on Cisco ASA firewall. What does this regular expression do?

A.

It captures documents in an HTTP network session.

A.

It captures documents in an HTTP network session.

Answers
B.

It captures .doc, .xls, and .pdf files in HTTP v1.0 and v1.1.

B.

It captures .doc, .xls, and .pdf files in HTTP v1.0 and v1.1.

Answers
C.

It captures .doc, .xls, and .ppt files extensions in HTTP v1.0.

C.

It captures .doc, .xls, and .ppt files extensions in HTTP v1.0.

Answers
D.

It captures Word, Excel, and PowerPoint files in HTTPv1.0 and v1.1.

D.

It captures Word, Excel, and PowerPoint files in HTTPv1.0 and v1.1.

Answers
Suggested answer: D

Explanation:

The regular expression provided is: .\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1 .[01]

This regular expression is designed to match file extensions for Word (.doc), Excel (.xls), and PowerPoint (.ppt) files in HTTP network sessions.

The regular expression uses character classes and alternatives to match different case variations of these file extensions.

The part .\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) matches the file extensions, and HTTP/1 .[01] ensures that the match is in the context of HTTP version 1.0 or 1.1.

Cisco ASA Regular Expressions Documentation

Understanding Regular Expressions in Network Security

Filtering and Capturing HTTP Traffic with Regex

What is a comparison between rule-based and statistical detection?

A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.

A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.

Answers
B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.

B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.

Answers
C.

Rule-based uses data known beforehand and statistical is based on assumptions.

C.

Rule-based uses data known beforehand and statistical is based on assumptions.

Answers
D.

Statistical uses the probability approach while rule-based Is based on measured data.

D.

Statistical uses the probability approach while rule-based Is based on measured data.

Answers
Suggested answer: C

Explanation:

Rule-based detection methods rely on predefined rules and patterns that are known beforehand. These rules are created based on prior knowledge of what constitutes normal and abnormal behavior.

Statistical detection, on the other hand, involves analyzing data to identify anomalies. It is based on assumptions about what normal behavior looks like and uses statistical methods to detect deviations from this norm.

Rule-based systems are typically straightforward but may miss novel attacks that do not match existing rules.

Statistical methods can detect previously unknown threats by recognizing patterns that deviate from established baselines but may produce more false positives.

Intrusion Detection Systems (IDS) Concepts

Comparative Studies on Rule-based and Statistical Anomaly Detection

Understanding Anomaly Detection in Network Security

What is a comparison between rule-based and statistical detection?

A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.

A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.

Answers
B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.

B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.

Answers
C.

Rule-based uses data known beforehand and statistical is based on assumptions.

C.

Rule-based uses data known beforehand and statistical is based on assumptions.

Answers
D.

Statistical uses the probability approach while rule-based Is based on measured data.

D.

Statistical uses the probability approach while rule-based Is based on measured data.

Answers
Suggested answer: C

Explanation:

Rule-based detection methods rely on predefined rules and patterns that are known beforehand. These rules are created based on prior knowledge of what constitutes normal and abnormal behavior.

Statistical detection, on the other hand, involves analyzing data to identify anomalies. It is based on assumptions about what normal behavior looks like and uses statistical methods to detect deviations from this norm.

Rule-based systems are typically straightforward but may miss novel attacks that do not match existing rules.

Statistical methods can detect previously unknown threats by recognizing patterns that deviate from established baselines but may produce more false positives.

Intrusion Detection Systems (IDS) Concepts

Comparative Studies on Rule-based and Statistical Anomaly Detection

Understanding Anomaly Detection in Network Security

Refer to the exhibit.

Which attack is being attempted against a web application?

A.

SQL injection

A.

SQL injection

Answers
B.

man-in-the-middle

B.

man-in-the-middle

Answers
C.

command injection

C.

command injection

Answers
D.

denial of service

D.

denial of service

Answers
Suggested answer: C

Explanation:

The exhibit shows an HTTP GET request with a parameter that includes ; /bin/sh -c id.

This indicates a command injection attempt, where the attacker is trying to execute shell commands on the server.

Command injection vulnerabilities allow an attacker to execute arbitrary commands on the host operating system via a vulnerable application.

The use of /bin/sh and the -c flag is typical in command injection exploits to run shell commands, such as id, which returns user identity information.

OWASP Command Injection

Analyzing HTTP Requests for Injection Attacks

Web Application Security Testing Guidelines

Total 331 questions
Go to page: of 34