ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.

Which information is available on the server certificate?

server name, trusted subordinate CA, and private key

server name, trusted subordinate CA, and private key

trusted subordinate CA, public key, and cipher suites

trusted subordinate CA, public key, and cipher suites

trusted CA name, cipher suites, and private key

trusted CA name, cipher suites, and private key

server name, trusted CA, and public key

server name, trusted CA, and public key

Suggested answer: D
Explanation:

When communicating via TLS, part of the handshake process involves presenting a certificate containing the server name, the name of the trusted CA that issued the certificate, and the public key of the server. The client can verify the validity of the certificate and use the public key to encrypt the data sent to the server.Reference:=Cisco Cybersecurity Source Documents

asked 07/10/2024
OLUSEGUN IJAOLA
34 questions

Question 62

Report Export Collapse

How does an SSL certificate impact security between the client and the server?

by enabling an authenticated channel between the client and the server

by enabling an authenticated channel between the client and the server

by creating an integrated channel between the client and the server

by creating an integrated channel between the client and the server

by enabling an authorized channel between the client and the server

by enabling an authorized channel between the client and the server

by creating an encrypted channel between the client and the server

by creating an encrypted channel between the client and the server

Suggested answer: D
Explanation:

An SSL certificate enables the establishment of a secure connection between the client and the server using the TLS protocol. The client and the server exchange keys and agree on a cipher suite to encrypt and decrypt the data transmitted over the network.Reference:=Cisco Cybersecurity Source Documents

asked 07/10/2024
Dean Pillay
52 questions

Question 63

Report Export Collapse

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

forgery attack

forgery attack

plaintext-only attack

plaintext-only attack

ciphertext-only attack

ciphertext-only attack

meet-in-the-middle attack

meet-in-the-middle attack

Suggested answer: C
Explanation:

When a stream cipher like RC4 is used twice with the same key, it becomes vulnerable to a ciphertext-only attack. In this type of attack, the attacker has access to several ciphertexts that are encrypted with the same key but does not know anything about the plaintexts. By analyzing these ciphertexts, an attacker can gain insights into the plaintext or even recover parts or all of it.Reference:= Cisco Cybersecurity source documents or study guide (I need to search for specific references as I don't have direct access to Cisco's proprietary content)

asked 07/10/2024
Shirish Astagikar
46 questions

Question 64

Report Export Collapse

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

Suggested answer: C
Explanation:

During the negotiation phase of the TLS handshake, the client sends a ''ClientHello'' message to the server which includes information about TLS versions it supports, cipher-suites it supports and suggested compression methods. This initiates communication protocols for secure connection.Reference:= Cisco Cybersecurity source documents or study guide

asked 07/10/2024
KENEILWE DITHLAGE
47 questions

Question 65

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 65 109242 10072024004349000000

Which type of log is displayed?

IDS

IDS

proxy

proxy

NetFlow

NetFlow

sys

sys

Suggested answer: D
Explanation:

The exhibit displays a sys log which is used in computer systems for messaging logs. It provides messaging tracking services from different devices like routers, switches etc., which helps in tracking and identifying potential issues.Reference:= Cisco Cybersecurity source documents or study guide

asked 07/10/2024
Amit Sharma
28 questions

Question 66

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 66 109243 10072024004349000000

What information is depicted?

IIS data

IIS data

NetFlow data

NetFlow data

network discovery event

network discovery event

IPS event data

IPS event data

Suggested answer: B
asked 07/10/2024
Jeffrey Holt Jr
29 questions

Question 67

Report Export Collapse

What is the difference between the ACK flag and the RST flag in the NetFlow log session?

The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete

The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete

The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete

The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete

The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection

The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection

The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection

The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection

Suggested answer: D
Explanation:

In NetFlow log sessions within TCP connections; ACK flag is used for acknowledging that data has been successfully received while RST flag is used when there's an error or when closing a connection spontaneously without following standard procedures.Reference:= Cisco Cybersecurity source documents or study guide

asked 07/10/2024
franz yap
33 questions

Question 68

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 68 109245 10072024004349000000

Which type of log is displayed?

proxy

proxy

NetFlow

NetFlow

IDS

IDS

sys

sys

Suggested answer: B
Explanation:

The exhibit shows a log that contains information such as the date, flow start, duration, protocol used, source and destination IP addresses and ports, packets, bytes, and flows. This type of detailed metadata is typically associated with NetFlow logs which are used for collecting IP traffic information and monitoring network traffic.Reference:=Cisco CyberOps Associate

asked 07/10/2024
Tunde Ogunkoya
33 questions

Question 69

Report Export Collapse

How is NetFlow different from traffic mirroring?

NetFlow collects metadata and traffic mirroring clones data.

NetFlow collects metadata and traffic mirroring clones data.

Traffic mirroring impacts switch performance and NetFlow does not.

Traffic mirroring impacts switch performance and NetFlow does not.

Traffic mirroring costs less to operate than NetFlow.

Traffic mirroring costs less to operate than NetFlow.

NetFlow generates more data than traffic mirroring.

NetFlow generates more data than traffic mirroring.

Suggested answer: A
Explanation:

NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network traffic. It collects metadata of the IP traffic flowing across networking devices like routers and switches. On the other hand, Traffic mirroring involves capturing all the data packets that flow through a particular point in the network to analyze or inspect them later.Reference:=Cisco Cybersecurity Operations Fundamentals

asked 07/10/2024
Armindo Malafaia Neto
39 questions

Question 70

Report Export Collapse

What makes HTTPS traffic difficult to monitor?

SSL interception

SSL interception

packet header size

packet header size

signature detection time

signature detection time

encryption

encryption

Suggested answer: D
Explanation:

HTTPS uses SSL/TLS encryption to secure data transmission over the internet. This encryption makes it difficult to monitor HTTPS traffic because the data packets are encrypted making them unreadable to anyone trying to intercept or monitor the data without proper decryption keys.Reference:=Cisco CyberOps Associate

asked 07/10/2024
Moshope Salami
48 questions
Total 331 questions
Go to page: of 34