ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Related questions











What does an attacker use to determine which network ports are listening on a potential target device?

A.

man-in-the-middle

A.

man-in-the-middle

Answers
B.

port scanning

B.

port scanning

Answers
C.

SQL injection

C.

SQL injection

Answers
D.

ping sweep

D.

ping sweep

Answers
Suggested answer: B

Explanation:

Port scanning is a technique that an attacker uses to discover which network ports are open, closed, or filtered on a target device. By sending packets to different ports and observing the responses, an attacker can identify the services and applications running on the device, as well as potential vulnerabilities that can be exploited. Port scanning is a common reconnaissance activity that precedes an attack.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-6;200-201 CBROPS - Cisco, exam topic 1.1.a

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)

A.

Untampered images are used in the security investigation process

A.

Untampered images are used in the security investigation process

Answers
B.

Tampered images are used in the security investigation process

B.

Tampered images are used in the security investigation process

Answers
C.

The image is tampered if the stored hash and the computed hash match

C.

The image is tampered if the stored hash and the computed hash match

Answers
D.

Tampered images are used in the incident recovery process

D.

Tampered images are used in the incident recovery process

Answers
E.

The image is untampered if the stored hash and the computed hash match

E.

The image is untampered if the stored hash and the computed hash match

Answers
Suggested answer: A, E

Explanation:

Untampered images are crucial for security investigations as they provide original evidence that has not been altered or corrupted; their integrity and authenticity can be verified by comparing the stored hash and the computed hash of the image. If they match, the image is untampered and can be used for analysis. Tampered images, on the other hand, are useless for security investigations as they may contain false or misleading information; their integrity and authenticity are compromised by the modification of the image data. Tampered images may be used for incident recovery purposes, such as restoring a system to a previous state, but not for forensic purposes.Reference:=Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

A.

examination

A.

examination

Answers
B.

investigation

B.

investigation

Answers
C.

collection

C.

collection

Answers
D.

reporting

D.

reporting

Answers
Suggested answer: C

Explanation:

During the collection phase of the forensic process, data related to a specific event is labeled and recorded to preserve its integrity. This step ensures that the data remains unaltered and authentic from the time of collection until it is presented as evidence, maintaining the chain of custody.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

Which step in the incident response process researches an attacking host through logs in a SIEM?

A.

detection and analysis

A.

detection and analysis

Answers
B.

preparation

B.

preparation

Answers
C.

eradication

C.

eradication

Answers
D.

containment

D.

containment

Answers
Suggested answer: A

Explanation:

In the incident response process, detection and analysis involve researching an attacking host through logs in a Security Information and Event Management (SIEM) system. This step helps in identifying, validating, and managing potential security incidents.Reference:=Cisco CyberOps Associate - Module 3: Security Monitoring

A malicious file has been identified in a sandbox analysis tool.

Which piece of information is needed to search for additional downloads of this file by other hosts?

A.

file header type

A.

file header type

Answers
B.

file size

B.

file size

Answers
C.

file name

C.

file name

Answers
D.

file hash value

D.

file hash value

Answers
Suggested answer: D

Explanation:

To search for additional downloads of a malicious file by other hosts, the file hash value is needed. The hash value provides a unique identifier for each specific file version, enabling cybersecurity professionals to track down identical files across networks.Reference:=Cisco Certified CyberOps Associate Overview

Refer to the exhibit.

What is the potential threat identified in this Stealthwatch dashboard?

A.

Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.

A.

Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.

Answers
B.

Host 152.46.6.91 is being identified as a watchlist country for data transfer.

B.

Host 152.46.6.91 is being identified as a watchlist country for data transfer.

Answers
C.

Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.

C.

Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.

Answers
D.

Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.

D.

Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.

Answers
Suggested answer: D

Explanation:

The exhibit shows a Stealthwatch dashboard displaying information on alarming hosts, alarms by type, and today's alarms. On the left side under ''Top Alarming Hosts,'' there are five host IP addresses listed with their respective categories indicating different types of alerts including 'Data Hoarding' and 'Exfiltration.' In ''Alarms by Type'' section at center top part of image shows bar graphs representing various alarm types including 'Crypto Violation' with their respective counts. On right side under ''Today's Alarms,'' there's a table showing the details of each alarm such as the host IP, the alarm type, the severity, and the time. The potential threat identified in this dashboard is that host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91, which is a sign of data exfiltration. Data exfiltration is the unauthorized transfer of data from a compromised system to an external destination, such as a command and control server or a malicious actor. This can result in data loss, breach of confidentiality, and damage to the organization's reputation and assets.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 7: Network and Host Forensics

Refer to the exhibit.

What is the potential threat identified in this Stealthwatch dashboard?

A.

A policy violation is active for host 10.10.101.24.

A.

A policy violation is active for host 10.10.101.24.

Answers
B.

A host on the network is sending a DDoS attack to another inside host.

B.

A host on the network is sending a DDoS attack to another inside host.

Answers
C.

There are two active data exfiltration alerts.

C.

There are two active data exfiltration alerts.

Answers
D.

A policy violation is active for host 10.201.3.149.

D.

A policy violation is active for host 10.201.3.149.

Answers
Suggested answer: C

Explanation:

The exhibit shows a Stealthwatch dashboard displaying information on alarming hosts, alarms by type, and today's alarms. On the left side under ''Top Alarming Hosts,'' there are five host IP addresses listed with their respective categories indicating different types of alerts including 'Data Hoarding' and 'Exfiltration.' In ''Alarms by Type'' section at center top part of image shows bar graphs representing various alarm types including 'Crypto Violation' with their respective counts. On right side under ''Today's Alarms,'' there's a table showing the details of each alarm such as the host IP, the alarm type, the severity, and the time. The potential threat identified in this dashboard is that there are two active data exfiltration alerts, one for host 10.201.3.149 and another for host 10.10.101.24. Data exfiltration is the unauthorized transfer of data from a compromised system to an external destination, such as a command and control server or a malicious actor. This can result in data loss, breach of confidentiality, and damage to the organization's reputation and assets.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 7: Network and Host Forensics

Which security technology allows only a set of pre-approved applications to run on a system?

A.

application-level blacklisting

A.

application-level blacklisting

Answers
B.

host-based IPS

B.

host-based IPS

Answers
C.

application-level whitelisting

C.

application-level whitelisting

Answers
D.

antivirus

D.

antivirus

Answers
Suggested answer: C

Explanation:

Application-level whitelisting is a security technology that allows only a set of pre-approved applications to run on a system, and blocks any other unauthorized or malicious programs. This can prevent malware, ransomware, zero-day exploits, and other threats from compromising the system. Application-level whitelisting is also known as application control or application allowlisting.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 3: Host-Based Analysis, Lesson 3.2: Endpoint Security Technologies, Topic 3.2.3: Application Whitelisting, page 3-20.

An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?

A.

data from a CD copied using Mac-based system

A.

data from a CD copied using Mac-based system

Answers
B.

data from a CD copied using Linux system

B.

data from a CD copied using Linux system

Answers
C.

data from a DVD copied using Windows system

C.

data from a DVD copied using Windows system

Answers
D.

data from a CD copied using Windows

D.

data from a CD copied using Windows

Answers
Suggested answer: A

Explanation:

CDFS stands for Compact Disc File System, which is a file system used by Mac OS to store data on CDs. CDFS is also known as ISO 9660, which is a standard format for data interchange on optical discs. CDFS allows files to be accessed by different operating systems, such as Windows, Linux, and Mac OS. Therefore, an ISO file that is stored in CDFS format is data from a CD copied using Mac-based system.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0, Module 4: Network Intrusion Analysis, Lesson 4.4: File Type Analysis, Topic 4.4.1: File Systems, page 4-40.

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

A.

integrity

A.

integrity

Answers
B.

confidentiality

B.

confidentiality

Answers
C.

availability

C.

availability

Answers
D.

scope

D.

scope

Answers
Suggested answer: A

Explanation:

Integrity is a metric in CVSS that measures the impact of a vulnerability on the trustworthiness and veracity of the data or information in a system. A vulnerability that affects the integrity of a system can allow an attacker to modify, delete, or corrupt the data or information without authorization. An example of such a vulnerability is a bank account number tampering attack, where an attacker changes the destination bank account number of a transaction to redirect the funds to their own account.Reference:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-17;200-201 CBROPS - Cisco, exam topic 1.3.c

Total 331 questions
Go to page: of 34