ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?

A.

least privilege

A.

least privilege

Answers
B.

need to know

B.

need to know

Answers
C.

integrity validation

C.

integrity validation

Answers
D.

due diligence

D.

due diligence

Answers
Suggested answer: A

Explanation:

The principle of least privilege states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. This reduces the attack surface and limits the potential damage of a compromised account or process.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles

Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad

What is the virtual address space for a Windows process?

A.

physical location of an object in memory

A.

physical location of an object in memory

Answers
B.

set of pages that reside in the physical memory

B.

set of pages that reside in the physical memory

Answers
C.

system-level memory protection feature built into the operating system

C.

system-level memory protection feature built into the operating system

Answers
D.

set of virtual memory addresses that can be used

D.

set of virtual memory addresses that can be used

Answers
Suggested answer: D

Explanation:

The virtual address space for a Windows process is the set of virtual memory addresses that can be used by the process. Each process has its own virtual address space that is isolated from other processes. The virtual address space is divided into regions that have different attributes, such as read-only, read-write, execute, and so on. The virtual address space is mapped to the physical memory by the operating system using a data structure called a page table.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 4: Host-Based Analysis, Lesson 4.1: Windows Operating System

Virtual Address Space

Which security principle is violated by running all processes as root or administrator?

A.

principle of least privilege

A.

principle of least privilege

Answers
B.

role-based access control

B.

role-based access control

Answers
C.

separation of duties

C.

separation of duties

Answers
D.

trusted computing base

D.

trusted computing base

Answers
Suggested answer: A

Explanation:

Running all processes as root or administrator violates the principle of least privilege, which states that users and processes should be granted only the minimum permissions necessary to perform their specific role or function within an organization. Running all processes as root or administrator gives them full access and control over the system, which increases the risk of unauthorized actions, malicious attacks, and accidental errors. It also makes it easier for attackers to escalate their privileges and compromise the system.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 1: Security Concepts, Lesson 1.2: Security Principles

Cisco Certified CyberOps Associate Overview, Exam Topics, 1.1 Explain the CIA triad

What is the function of a command and control server?

A.

It enumerates open ports on a network device

A.

It enumerates open ports on a network device

Answers
B.

It drops secondary payload into malware

B.

It drops secondary payload into malware

Answers
C.

It is used to regain control of the network after a compromise

C.

It is used to regain control of the network after a compromise

Answers
D.

It sends instruction to a compromised system

D.

It sends instruction to a compromised system

Answers
Suggested answer: D

Explanation:

A command and control server (C2 or C&C) is a server that is used by attackers to communicate with and control compromised systems, such as bots, zombies, or backdoors. The C2 server can send instructions to the compromised systems, such as executing commands, downloading files, uploading data, or launching attacks. The C2 server can also receive information from the compromised systems, such as system information, keystrokes, screenshots, or credentials.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.4: Malware

Cisco Certified CyberOps Associate Overview, Exam Topics, 3.4 Compare and contrast types of malware

What is the difference between deep packet inspection and stateful inspection?

A.

Deep packet inspection is more secure than stateful inspection on Layer 4

A.

Deep packet inspection is more secure than stateful inspection on Layer 4

Answers
B.

Stateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7

B.

Stateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7

Answers
C.

Stateful inspection is more secure than deep packet inspection on Layer 7

C.

Stateful inspection is more secure than deep packet inspection on Layer 7

Answers
D.

Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4

D.

Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4

Answers
Suggested answer: D

Explanation:

Deep packet inspection (DPI) and stateful inspection are two techniques that are used by firewalls and other network security devices to inspect and filter network traffic. Stateful inspection allows visibility on Layer 4 (transport layer) of the OSI model, which means it can track the state of TCP or UDP connections and filter packets based on source and destination IP addresses, ports, and protocols. Deep packet inspection allows visibility on Layer 7 (application layer) of the OSI model, which means it can inspect the contents and payloads of packets and filter packets based on application-specific criteria, such as signatures, keywords, URLs, or behaviors.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 2: Security Monitoring, Lesson 2.2: Network Security Monitoring Tools

Cisco Certified CyberOps Associate Overview, Exam Topics, 2.2 Describe the impact of network security monitoring tools on data privacy

Which evasion technique is a function of ransomware?

A.

extended sleep calls

A.

extended sleep calls

Answers
B.

encryption

B.

encryption

Answers
C.

resource exhaustion

C.

resource exhaustion

Answers
D.

encoding

D.

encoding

Answers
Suggested answer: B

Explanation:

Encryption is an evasion technique that is a function of ransomware, which is a type of malware that encrypts the victim's files or system and demands a ransom for the decryption key. Encryption is used by ransomware to prevent the victim from accessing their data and to avoid detection by antivirus or other security tools. Encryption can also be used by other types of malware to hide their communication, configuration, or payload from analysis.Reference:

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Network Intrusion Analysis, Lesson 3.4: Malware

Cisco Certified CyberOps Associate Overview, Exam Topics, 3.4 Compare and contrast types of malware

Refer to the exhibit.

Which two elements in the table are parts of the 5-tuple? (Choose two.)

A.

First Packet

A.

First Packet

Answers
B.

Initiator User

B.

Initiator User

Answers
C.

Ingress Security Zone

C.

Ingress Security Zone

Answers
D.

Source Port

D.

Source Port

Answers
E.

Initiator IP

E.

Initiator IP

Answers
Suggested answer: D, E

Explanation:

The 5-tuple refers to the five different values that are used to define a specific communication session in a network. These values include the source IP address, destination IP address, source port, destination port, and the protocol in use. In this case, option D (Source Port) and option E (Initiator IP) are parts of the 5-tuple.Reference:=Cisco Cybersecurity Operations Fundamentals

What is the difference between statistical detection and rule-based detection models?

A.

Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time

A.

Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time

Answers
B.

Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis

B.

Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis

Answers
C.

Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior

C.

Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior

Answers
D.

Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

D.

Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

Answers
Suggested answer: B

Explanation:

Statistical detection involves collecting data over time to define what is considered normal behavior or legitimate data for users or systems. It then uses statistical analysis to identify abnormal behavior that could indicate a security incident. Rule-based detection uses predefined rules or patterns that are based on known threats or vulnerabilities - it operates on an IF/THEN basis where if certain conditions are met then an alert is triggered.Reference:=Cisco Cybersecurity Operations Fundamentals

What is the difference between a threat and a risk?

A.

Threat represents a potential danger that could take advantage of a weakness in a system

A.

Threat represents a potential danger that could take advantage of a weakness in a system

Answers
B.

Risk represents the known and identified loss or danger in the system

B.

Risk represents the known and identified loss or danger in the system

Answers
C.

Risk represents the nonintentional interaction with uncertainty in the system

C.

Risk represents the nonintentional interaction with uncertainty in the system

Answers
D.

Threat represents a state of being exposed to an attack or a compromise, either physically or logically.

D.

Threat represents a state of being exposed to an attack or a compromise, either physically or logically.

Answers
Suggested answer: A

Explanation:

A threat represents a potential danger that could exploit a weakness in a system while risk is associated with the potential impact or loss that could occur if a threat exploits a vulnerability in the system. So, option A which states ''Threat represents a potential danger that could take advantage of a weakness in a system'' is correct.Reference:=Cisco Certified CyberOps Associate Overview

Which attack method intercepts traffic on a switched network?

A.

denial of service

A.

denial of service

Answers
B.

ARP cache poisoning

B.

ARP cache poisoning

Answers
C.

DHCP snooping

C.

DHCP snooping

Answers
D.

command and control

D.

command and control

Answers
Suggested answer: B

Explanation:

ARP cache poisoning is a type of attack that intercepts traffic on a switched network by sending spoofed ARP messages to associate the attacker's MAC address with the IP address of a legitimate host or gateway. This way, the attacker can redirect the traffic intended for the legitimate host or gateway to his own device and perform a man-in-the-middle attack.Reference:=Cisco Cybersecurity Operations Fundamentals

Total 331 questions
Go to page: of 34