ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

What does an attacker use to determine which network ports are listening on a potential target device?

man-in-the-middle

man-in-the-middle

port scanning

port scanning

SQL injection

SQL injection

ping sweep

ping sweep

Suggested answer: B
Explanation:

Port scanning is a technique that an attacker uses to discover which network ports are open, closed, or filtered on a target device. By sending packets to different ports and observing the responses, an attacker can identify the services and applications running on the device, as well as potential vulnerabilities that can be exploited. Port scanning is a common reconnaissance activity that precedes an attack.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-6;200-201 CBROPS - Cisco, exam topic 1.1.a

asked 07/10/2024
Elliott Leighton-Woodruff
38 questions

Question 42

Report Export Collapse

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)

Untampered images are used in the security investigation process

Untampered images are used in the security investigation process

Tampered images are used in the security investigation process

Tampered images are used in the security investigation process

The image is tampered if the stored hash and the computed hash match

The image is tampered if the stored hash and the computed hash match

Tampered images are used in the incident recovery process

Tampered images are used in the incident recovery process

The image is untampered if the stored hash and the computed hash match

The image is untampered if the stored hash and the computed hash match

Suggested answer: A, E
Explanation:

Untampered images are crucial for security investigations as they provide original evidence that has not been altered or corrupted; their integrity and authenticity can be verified by comparing the stored hash and the computed hash of the image. If they match, the image is untampered and can be used for analysis. Tampered images, on the other hand, are useless for security investigations as they may contain false or misleading information; their integrity and authenticity are compromised by the modification of the image data. Tampered images may be used for incident recovery purposes, such as restoring a system to a previous state, but not for forensic purposes.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

asked 07/10/2024
Paulina Radziszewska
39 questions

Question 43

Report Export Collapse

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

examination

examination

investigation

investigation

collection

collection

reporting

reporting

Suggested answer: C
Explanation:

During the collection phase of the forensic process, data related to a specific event is labeled and recorded to preserve its integrity. This step ensures that the data remains unaltered and authentic from the time of collection until it is presented as evidence, maintaining the chain of custody.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

asked 07/10/2024
Storage Junk
54 questions

Question 44

Report Export Collapse

Which step in the incident response process researches an attacking host through logs in a SIEM?

detection and analysis

detection and analysis

preparation

preparation

eradication

eradication

containment

containment

Suggested answer: A
Explanation:

In the incident response process, detection and analysis involve researching an attacking host through logs in a Security Information and Event Management (SIEM) system. This step helps in identifying, validating, and managing potential security incidents.Reference:=Cisco CyberOps Associate - Module 3: Security Monitoring

asked 07/10/2024
vceplus plus
51 questions

Question 45

Report Export Collapse

A malicious file has been identified in a sandbox analysis tool.

Which piece of information is needed to search for additional downloads of this file by other hosts?

file header type

file header type

file size

file size

file name

file name

file hash value

file hash value

Suggested answer: D
Explanation:

To search for additional downloads of a malicious file by other hosts, the file hash value is needed. The hash value provides a unique identifier for each specific file version, enabling cybersecurity professionals to track down identical files across networks.Reference:=Cisco Certified CyberOps Associate Overview

asked 07/10/2024
Vinayak H
38 questions

Question 46

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 46 109223 10072024004349000000

What is the potential threat identified in this Stealthwatch dashboard?

Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.

Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.

Host 152.46.6.91 is being identified as a watchlist country for data transfer.

Host 152.46.6.91 is being identified as a watchlist country for data transfer.

Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.

Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.

Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.

Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.

Suggested answer: D
Explanation:

The exhibit shows a Stealthwatch dashboard displaying information on alarming hosts, alarms by type, and today's alarms. On the left side under ''Top Alarming Hosts,'' there are five host IP addresses listed with their respective categories indicating different types of alerts including 'Data Hoarding' and 'Exfiltration.' In ''Alarms by Type'' section at center top part of image shows bar graphs representing various alarm types including 'Crypto Violation' with their respective counts. On right side under ''Today's Alarms,'' there's a table showing the details of each alarm such as the host IP, the alarm type, the severity, and the time. The potential threat identified in this dashboard is that host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91, which is a sign of data exfiltration. Data exfiltration is the unauthorized transfer of data from a compromised system to an external destination, such as a command and control server or a malicious actor. This can result in data loss, breach of confidentiality, and damage to the organization's reputation and assets.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 7: Network and Host Forensics

asked 07/10/2024
Nicola Pinotti
61 questions

Question 47

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 47 109224 10072024004349000000

What is the potential threat identified in this Stealthwatch dashboard?

A policy violation is active for host 10.10.101.24.

A policy violation is active for host 10.10.101.24.

A host on the network is sending a DDoS attack to another inside host.

A host on the network is sending a DDoS attack to another inside host.

There are two active data exfiltration alerts.

There are two active data exfiltration alerts.

A policy violation is active for host 10.201.3.149.

A policy violation is active for host 10.201.3.149.

Suggested answer: C
Explanation:

The exhibit shows a Stealthwatch dashboard displaying information on alarming hosts, alarms by type, and today's alarms. On the left side under ''Top Alarming Hosts,'' there are five host IP addresses listed with their respective categories indicating different types of alerts including 'Data Hoarding' and 'Exfiltration.' In ''Alarms by Type'' section at center top part of image shows bar graphs representing various alarm types including 'Crypto Violation' with their respective counts. On right side under ''Today's Alarms,'' there's a table showing the details of each alarm such as the host IP, the alarm type, the severity, and the time. The potential threat identified in this dashboard is that there are two active data exfiltration alerts, one for host 10.201.3.149 and another for host 10.10.101.24. Data exfiltration is the unauthorized transfer of data from a compromised system to an external destination, such as a command and control server or a malicious actor. This can result in data loss, breach of confidentiality, and damage to the organization's reputation and assets.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 7: Network and Host Forensics

asked 07/10/2024
B Erol
63 questions

Question 48

Report Export Collapse

Which security technology allows only a set of pre-approved applications to run on a system?

application-level blacklisting

application-level blacklisting

host-based IPS

host-based IPS

application-level whitelisting

application-level whitelisting

antivirus

antivirus

Suggested answer: C
Explanation:

Application-level whitelisting is a security technology that allows only a set of pre-approved applications to run on a system, and blocks any other unauthorized or malicious programs. This can prevent malware, ransomware, zero-day exploits, and other threats from compromising the system. Application-level whitelisting is also known as application control or application allowlisting.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Host-Based Analysis, Lesson 3.2: Endpoint Security Technologies, Topic 3.2.3: Application Whitelisting, page 3-20.

asked 07/10/2024
David Gallegos
45 questions

Question 49

Report Export Collapse

An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?

data from a CD copied using Mac-based system

data from a CD copied using Mac-based system

data from a CD copied using Linux system

data from a CD copied using Linux system

data from a DVD copied using Windows system

data from a DVD copied using Windows system

data from a CD copied using Windows

data from a CD copied using Windows

Suggested answer: A
Explanation:

CDFS stands for Compact Disc File System, which is a file system used by Mac OS to store data on CDs. CDFS is also known as ISO 9660, which is a standard format for data interchange on optical discs. CDFS allows files to be accessed by different operating systems, such as Windows, Linux, and Mac OS. Therefore, an ISO file that is stored in CDFS format is data from a CD copied using Mac-based system.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 4: Network Intrusion Analysis, Lesson 4.4: File Type Analysis, Topic 4.4.1: File Systems, page 4-40.

asked 07/10/2024
karl hickey
48 questions

Question 50

Report Export Collapse

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

integrity

integrity

confidentiality

confidentiality

availability

availability

scope

scope

Suggested answer: A
Explanation:

Integrity is a metric in CVSS that measures the impact of a vulnerability on the trustworthiness and veracity of the data or information in a system. A vulnerability that affects the integrity of a system can allow an attacker to modify, delete, or corrupt the data or information without authorization. An example of such a vulnerability is a bank account number tampering attack, where an attacker changes the destination bank account number of a transaction to redirect the funds to their own account.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-17;200-201 CBROPS - Cisco, exam topic 1.3.c

asked 07/10/2024
FELIPE DE JESUS RODRIGUEZ ANGULO
39 questions
Total 378 questions
Go to page: of 38