Cisco 200-201 Practice Test - Questions Answers, Page 5

List of questions
Question 41

What does an attacker use to determine which network ports are listening on a potential target device?
man-in-the-middle
port scanning
SQL injection
ping sweep
Port scanning is a technique that an attacker uses to discover which network ports are open, closed, or filtered on a target device. By sending packets to different ports and observing the responses, an attacker can identify the services and applications running on the device, as well as potential vulnerabilities that can be exploited. Port scanning is a common reconnaissance activity that precedes an attack.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-6;200-201 CBROPS - Cisco, exam topic 1.1.a
Question 42

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Untampered images are used in the security investigation process
Tampered images are used in the security investigation process
The image is tampered if the stored hash and the computed hash match
Tampered images are used in the incident recovery process
The image is untampered if the stored hash and the computed hash match
Untampered images are crucial for security investigations as they provide original evidence that has not been altered or corrupted; their integrity and authenticity can be verified by comparing the stored hash and the computed hash of the image. If they match, the image is untampered and can be used for analysis. Tampered images, on the other hand, are useless for security investigations as they may contain false or misleading information; their integrity and authenticity are compromised by the modification of the image data. Tampered images may be used for incident recovery purposes, such as restoring a system to a previous state, but not for forensic purposes.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations
Question 43

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
examination
investigation
collection
reporting
During the collection phase of the forensic process, data related to a specific event is labeled and recorded to preserve its integrity. This step ensures that the data remains unaltered and authentic from the time of collection until it is presented as evidence, maintaining the chain of custody.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations
Question 44

Which step in the incident response process researches an attacking host through logs in a SIEM?
detection and analysis
preparation
eradication
containment
In the incident response process, detection and analysis involve researching an attacking host through logs in a Security Information and Event Management (SIEM) system. This step helps in identifying, validating, and managing potential security incidents.Reference:=Cisco CyberOps Associate - Module 3: Security Monitoring
Question 45

A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?
file header type
file size
file name
file hash value
To search for additional downloads of a malicious file by other hosts, the file hash value is needed. The hash value provides a unique identifier for each specific file version, enabling cybersecurity professionals to track down identical files across networks.Reference:=Cisco Certified CyberOps Associate Overview
Question 46

Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.
Host 152.46.6.91 is being identified as a watchlist country for data transfer.
Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.
Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.
The exhibit shows a Stealthwatch dashboard displaying information on alarming hosts, alarms by type, and today's alarms. On the left side under ''Top Alarming Hosts,'' there are five host IP addresses listed with their respective categories indicating different types of alerts including 'Data Hoarding' and 'Exfiltration.' In ''Alarms by Type'' section at center top part of image shows bar graphs representing various alarm types including 'Crypto Violation' with their respective counts. On right side under ''Today's Alarms,'' there's a table showing the details of each alarm such as the host IP, the alarm type, the severity, and the time. The potential threat identified in this dashboard is that host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91, which is a sign of data exfiltration. Data exfiltration is the unauthorized transfer of data from a compromised system to an external destination, such as a command and control server or a malicious actor. This can result in data loss, breach of confidentiality, and damage to the organization's reputation and assets.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 7: Network and Host Forensics
Question 47

Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
A policy violation is active for host 10.10.101.24.
A host on the network is sending a DDoS attack to another inside host.
There are two active data exfiltration alerts.
A policy violation is active for host 10.201.3.149.
The exhibit shows a Stealthwatch dashboard displaying information on alarming hosts, alarms by type, and today's alarms. On the left side under ''Top Alarming Hosts,'' there are five host IP addresses listed with their respective categories indicating different types of alerts including 'Data Hoarding' and 'Exfiltration.' In ''Alarms by Type'' section at center top part of image shows bar graphs representing various alarm types including 'Crypto Violation' with their respective counts. On right side under ''Today's Alarms,'' there's a table showing the details of each alarm such as the host IP, the alarm type, the severity, and the time. The potential threat identified in this dashboard is that there are two active data exfiltration alerts, one for host 10.201.3.149 and another for host 10.10.101.24. Data exfiltration is the unauthorized transfer of data from a compromised system to an external destination, such as a command and control server or a malicious actor. This can result in data loss, breach of confidentiality, and damage to the organization's reputation and assets.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 7: Network and Host Forensics
Question 48

Which security technology allows only a set of pre-approved applications to run on a system?
application-level blacklisting
host-based IPS
application-level whitelisting
antivirus
Application-level whitelisting is a security technology that allows only a set of pre-approved applications to run on a system, and blocks any other unauthorized or malicious programs. This can prevent malware, ransomware, zero-day exploits, and other threats from compromising the system. Application-level whitelisting is also known as application control or application allowlisting.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Host-Based Analysis, Lesson 3.2: Endpoint Security Technologies, Topic 3.2.3: Application Whitelisting, page 3-20.
Question 49

An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?
data from a CD copied using Mac-based system
data from a CD copied using Linux system
data from a DVD copied using Windows system
data from a CD copied using Windows
CDFS stands for Compact Disc File System, which is a file system used by Mac OS to store data on CDs. CDFS is also known as ISO 9660, which is a standard format for data interchange on optical discs. CDFS allows files to be accessed by different operating systems, such as Windows, Linux, and Mac OS. Therefore, an ISO file that is stored in CDFS format is data from a CD copied using Mac-based system.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 4: Network Intrusion Analysis, Lesson 4.4: File Type Analysis, Topic 4.4.1: File Systems, page 4-40.
Question 50

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
integrity
confidentiality
availability
scope
Integrity is a metric in CVSS that measures the impact of a vulnerability on the trustworthiness and veracity of the data or information in a system. A vulnerability that affects the integrity of a system can allow an attacker to modify, delete, or corrupt the data or information without authorization. An example of such a vulnerability is a bank account number tampering attack, where an attacker changes the destination bank account number of a transaction to redirect the funds to their own account.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-17;200-201 CBROPS - Cisco, exam topic 1.3.c
Question