ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 4

List of questions

Question 31

Report Export Collapse

What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?

least privilege

least privilege

need to know

need to know

integrity validation

integrity validation

due diligence

due diligence

Suggested answer: A
Explanation:

The principle of least privilege states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. This reduces the attack surface and limits the potential damage of a compromised account or process.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles

Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad

asked 07/10/2024
mohamad rachwani
38 questions

Question 32

Report Export Collapse

What is the virtual address space for a Windows process?

physical location of an object in memory

physical location of an object in memory

set of pages that reside in the physical memory

set of pages that reside in the physical memory

system-level memory protection feature built into the operating system

system-level memory protection feature built into the operating system

set of virtual memory addresses that can be used

set of virtual memory addresses that can be used

Suggested answer: D
Explanation:

The virtual address space for a Windows process is the set of virtual memory addresses that can be used by the process. Each process has its own virtual address space that is isolated from other processes. The virtual address space is divided into regions that have different attributes, such as read-only, read-write, execute, and so on. The virtual address space is mapped to the physical memory by the operating system using a data structure called a page table.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 4: Host-Based Analysis, Lesson 4.1: Windows Operating System

Virtual Address Space

asked 07/10/2024
Richard lavery
43 questions

Question 33

Report Export Collapse

Which security principle is violated by running all processes as root or administrator?

principle of least privilege

principle of least privilege

role-based access control

role-based access control

separation of duties

separation of duties

trusted computing base

trusted computing base

Suggested answer: A
Explanation:

Running all processes as root or administrator violates the principle of least privilege, which states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. Running all processes as root or administrator gives them full access and control over the system, which increases the risk of unauthorized actions, malicious attacks, and accidental errors. It also makes it easier for attackers to escalate their privileges and compromise the system.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles

Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad

asked 07/10/2024
Rolf Johannesen|
33 questions

Question 34

Report Export Collapse

What is the function of a command and control server?

It enumerates open ports on a network device

It enumerates open ports on a network device

It drops secondary payload into malware

It drops secondary payload into malware

It is used to regain control of the network after a compromise

It is used to regain control of the network after a compromise

It sends instruction to a compromised system

It sends instruction to a compromised system

Suggested answer: D
Explanation:

A command and control server (C2 or C&C) is a server that is used by attackers to communicate with and control compromised systems, such as bots, zombies, or backdoors. The C2 server can send instructions to the compromised systems, such as executing commands, downloading files, uploading data, or launching attacks. The C2 server can also receive information from the compromised systems, such as system information, keystrokes, screenshots, or credentials.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.4: Malware

Cisco Certified CyberOps Associate Overview, Exam Topics, 3.4 Compare and contrast types of malware

asked 07/10/2024
DATA DYNAMICAL SOLUTIONS
38 questions

Question 35

Report Export Collapse

What is the difference between deep packet inspection and stateful inspection?

Deep packet inspection is more secure than stateful inspection on Layer 4

Deep packet inspection is more secure than stateful inspection on Layer 4

Stateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7

Stateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7

Stateful inspection is more secure than deep packet inspection on Layer 7

Stateful inspection is more secure than deep packet inspection on Layer 7

Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4

Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4

Suggested answer: D
Explanation:

Deep packet inspection (DPI) and stateful inspection are two techniques that are used by firewalls and other network security devices to inspect and filter network traffic. Stateful inspection allows visibility on Layer 4 (transport layer) of the OSI model, which means it can track the state of TCP or UDP connections and filter packets based on source and destination IP addresses, ports, and protocols. Deep packet inspection allows visibility on Layer 7 (application layer) of the OSI model, which means it can inspect the contents and payloads of packets and filter packets based on application-specific criteria, such as signatures, keywords, URLs, or behaviors.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 2: Security Monitoring, Lesson 2.2: Network Security Monitoring Tools

Cisco Certified CyberOps Associate Overview, Exam Topics, 2.2 Describe the impact of network security monitoring tools on data privacy

asked 07/10/2024
Karol Ligeza
46 questions

Question 36

Report Export Collapse

Which evasion technique is a function of ransomware?

extended sleep calls

extended sleep calls

encryption

encryption

resource exhaustion

resource exhaustion

encoding

encoding

Suggested answer: B
Explanation:

Encryption is an evasion technique that is a function of ransomware, which is a type of malware that encrypts the victim's files or system and demands a ransom for the decryption key. Encryption is used by ransomware to prevent the victim from accessing their data and to avoid detection by antivirus or other security tools. Encryption can also be used by other types of malware to hide their communication, configuration, or payload from analysis.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.4: Malware

Cisco Certified CyberOps Associate Overview, Exam Topics, 3.4 Compare and contrast types of malware

asked 07/10/2024
Okan YILDIZ
45 questions

Question 37

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 37 109214 10072024004348000000

Which two elements in the table are parts of the 5-tuple? (Choose two.)

First Packet

First Packet

Initiator User

Initiator User

Ingress Security Zone

Ingress Security Zone

Source Port

Source Port

Initiator IP

Initiator IP

Suggested answer: D, E
Explanation:

The 5-tuple refers to the five different values that are used to define a specific communication session in a network. These values include the source IP address, destination IP address, source port, destination port, and the protocol in use. In this case, option D (Source Port) and option E (Initiator IP) are parts of the 5-tuple.Reference:=Cisco Cybersecurity Operations Fundamentals

asked 07/10/2024
VIVEKANANDAN BALARAMAN
42 questions

Question 38

Report Export Collapse

What is the difference between statistical detection and rule-based detection models?

Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time

Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time

Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis

Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis

Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior

Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior

Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

Suggested answer: B
Explanation:

Statistical detection involves collecting data over time to define what is considered normal behavior or legitimate data for users or systems. It then uses statistical analysis to identify abnormal behavior that could indicate a security incident. Rule-based detection uses predefined rules or patterns that are based on known threats or vulnerabilities - it operates on an IF/THEN basis where if certain conditions are met then an alert is triggered.Reference:=Cisco Cybersecurity Operations Fundamentals

asked 07/10/2024
Mikalai Yurouski
35 questions

Question 39

Report Export Collapse

What is the difference between a threat and a risk?

Threat represents a potential danger that could take advantage of a weakness in a system

Threat represents a potential danger that could take advantage of a weakness in a system

Risk represents the known and identified loss or danger in the system

Risk represents the known and identified loss or danger in the system

Risk represents the nonintentional interaction with uncertainty in the system

Risk represents the nonintentional interaction with uncertainty in the system

Threat represents a state of being exposed to an attack or a compromise, either physically or logically.

Threat represents a state of being exposed to an attack or a compromise, either physically or logically.

Suggested answer: A
Explanation:

A threat represents a potential danger that could exploit a weakness in a system while risk is associated with the potential impact or loss that could occur if a threat exploits a vulnerability in the system. So, option A which states ''Threat represents a potential danger that could take advantage of a weakness in a system'' is correct.Reference:=Cisco Certified CyberOps Associate Overview

asked 07/10/2024
Mark Arnold Santos
47 questions

Question 40

Report Export Collapse

Which attack method intercepts traffic on a switched network?

denial of service

denial of service

ARP cache poisoning

ARP cache poisoning

DHCP snooping

DHCP snooping

command and control

command and control

Suggested answer: B
Explanation:

ARP cache poisoning is a type of attack that intercepts traffic on a switched network by sending spoofed ARP messages to associate the attacker's MAC address with the IP address of a legitimate host or gateway. This way, the attacker can redirect the traffic intended for the legitimate host or gateway to his own device and perform a man-in-the-middle attack.Reference:=Cisco Cybersecurity Operations Fundamentals

asked 07/10/2024
chalapathy naidu
44 questions
Total 331 questions
Go to page: of 34