Cisco 200-201 Practice Test - Questions Answers, Page 4
List of questions
Question 31

What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?
least privilege
need to know
integrity validation
due diligence
The principle of least privilege states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. This reduces the attack surface and limits the potential damage of a compromised account or process.Reference:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles
Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad
Question 32

What is the virtual address space for a Windows process?
physical location of an object in memory
set of pages that reside in the physical memory
system-level memory protection feature built into the operating system
set of virtual memory addresses that can be used
The virtual address space for a Windows process is the set of virtual memory addresses that can be used by the process. Each process has its own virtual address space that is isolated from other processes. The virtual address space is divided into regions that have different attributes, such as read-only, read-write, execute, and so on. The virtual address space is mapped to the physical memory by the operating system using a data structure called a page table.Reference:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 4: Host-Based Analysis, Lesson 4.1: Windows Operating System
Virtual Address Space
Question 33

Which security principle is violated by running all processes as root or administrator?
principle of least privilege
role-based access control
separation of duties
trusted computing base
Running all processes as root or administrator violates the principle of least privilege, which states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. Running all processes as root or administrator gives them full access and control over the system, which increases the risk of unauthorized actions, malicious attacks, and accidental errors. It also makes it easier for attackers to escalate their privileges and compromise the system.Reference:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles
Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad
Question 34

What is the function of a command and control server?
It enumerates open ports on a network device
It drops secondary payload into malware
It is used to regain control of the network after a compromise
It sends instruction to a compromised system
A command and control server (C2 or C&C) is a server that is used by attackers to communicate with and control compromised systems, such as bots, zombies, or backdoors. The C2 server can send instructions to the compromised systems, such as executing commands, downloading files, uploading data, or launching attacks. The C2 server can also receive information from the compromised systems, such as system information, keystrokes, screenshots, or credentials.Reference:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.4: Malware
Cisco Certified CyberOps Associate Overview, Exam Topics, 3.4 Compare and contrast types of malware
Question 35

What is the difference between deep packet inspection and stateful inspection?
Deep packet inspection is more secure than stateful inspection on Layer 4
Stateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7
Stateful inspection is more secure than deep packet inspection on Layer 7
Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4
Deep packet inspection (DPI) and stateful inspection are two techniques that are used by firewalls and other network security devices to inspect and filter network traffic. Stateful inspection allows visibility on Layer 4 (transport layer) of the OSI model, which means it can track the state of TCP or UDP connections and filter packets based on source and destination IP addresses, ports, and protocols. Deep packet inspection allows visibility on Layer 7 (application layer) of the OSI model, which means it can inspect the contents and payloads of packets and filter packets based on application-specific criteria, such as signatures, keywords, URLs, or behaviors.Reference:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 2: Security Monitoring, Lesson 2.2: Network Security Monitoring Tools
Cisco Certified CyberOps Associate Overview, Exam Topics, 2.2 Describe the impact of network security monitoring tools on data privacy
Question 36

Which evasion technique is a function of ransomware?
extended sleep calls
encryption
resource exhaustion
encoding
Encryption is an evasion technique that is a function of ransomware, which is a type of malware that encrypts the victim's files or system and demands a ransom for the decryption key. Encryption is used by ransomware to prevent the victim from accessing their data and to avoid detection by antivirus or other security tools. Encryption can also be used by other types of malware to hide their communication, configuration, or payload from analysis.Reference:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.4: Malware
Cisco Certified CyberOps Associate Overview, Exam Topics, 3.4 Compare and contrast types of malware
Question 37

Refer to the exhibit.
Which two elements in the table are parts of the 5-tuple? (Choose two.)
First Packet
Initiator User
Ingress Security Zone
Source Port
Initiator IP
The 5-tuple refers to the five different values that are used to define a specific communication session in a network. These values include the source IP address, destination IP address, source port, destination port, and the protocol in use. In this case, option D (Source Port) and option E (Initiator IP) are parts of the 5-tuple.Reference:=Cisco Cybersecurity Operations Fundamentals
Question 38

What is the difference between statistical detection and rule-based detection models?
Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior
Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
Statistical detection involves collecting data over time to define what is considered normal behavior or legitimate data for users or systems. It then uses statistical analysis to identify abnormal behavior that could indicate a security incident. Rule-based detection uses predefined rules or patterns that are based on known threats or vulnerabilities - it operates on an IF/THEN basis where if certain conditions are met then an alert is triggered.Reference:=Cisco Cybersecurity Operations Fundamentals
Question 39

What is the difference between a threat and a risk?
Threat represents a potential danger that could take advantage of a weakness in a system
Risk represents the known and identified loss or danger in the system
Risk represents the nonintentional interaction with uncertainty in the system
Threat represents a state of being exposed to an attack or a compromise, either physically or logically.
A threat represents a potential danger that could exploit a weakness in a system while risk is associated with the potential impact or loss that could occur if a threat exploits a vulnerability in the system. So, option A which states ''Threat represents a potential danger that could take advantage of a weakness in a system'' is correct.Reference:=Cisco Certified CyberOps Associate Overview
Question 40

Which attack method intercepts traffic on a switched network?
denial of service
ARP cache poisoning
DHCP snooping
command and control
ARP cache poisoning is a type of attack that intercepts traffic on a switched network by sending spoofed ARP messages to associate the attacker's MAC address with the IP address of a legitimate host or gateway. This way, the attacker can redirect the traffic intended for the legitimate host or gateway to his own device and perform a man-in-the-middle attack.Reference:=Cisco Cybersecurity Operations Fundamentals
Question