Cisco 200-201 Practice Test - Questions Answers, Page 7
List of questions
Question 61

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?
server name, trusted subordinate CA, and private key
trusted subordinate CA, public key, and cipher suites
trusted CA name, cipher suites, and private key
server name, trusted CA, and public key
When communicating via TLS, part of the handshake process involves presenting a certificate containing the server name, the name of the trusted CA that issued the certificate, and the public key of the server. The client can verify the validity of the certificate and use the public key to encrypt the data sent to the server.Reference:=Cisco Cybersecurity Source Documents
Question 62

How does an SSL certificate impact security between the client and the server?
by enabling an authenticated channel between the client and the server
by creating an integrated channel between the client and the server
by enabling an authorized channel between the client and the server
by creating an encrypted channel between the client and the server
An SSL certificate enables the establishment of a secure connection between the client and the server using the TLS protocol. The client and the server exchange keys and agree on a cipher suite to encrypt and decrypt the data transmitted over the network.Reference:=Cisco Cybersecurity Source Documents
Question 63

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?
forgery attack
plaintext-only attack
ciphertext-only attack
meet-in-the-middle attack
When a stream cipher like RC4 is used twice with the same key, it becomes vulnerable to a ciphertext-only attack. In this type of attack, the attacker has access to several ciphertexts that are encrypted with the same key but does not know anything about the plaintexts. By analyzing these ciphertexts, an attacker can gain insights into the plaintext or even recover parts or all of it.Reference:= Cisco Cybersecurity source documents or study guide (I need to search for specific references as I don't have direct access to Cisco's proprietary content)
Question 64

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?
ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods
ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods
ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
During the negotiation phase of the TLS handshake, the client sends a ''ClientHello'' message to the server which includes information about TLS versions it supports, cipher-suites it supports and suggested compression methods. This initiates communication protocols for secure connection.Reference:= Cisco Cybersecurity source documents or study guide
Question 65

Refer to the exhibit.
Which type of log is displayed?
IDS
proxy
NetFlow
sys
The exhibit displays a sys log which is used in computer systems for messaging logs. It provides messaging tracking services from different devices like routers, switches etc., which helps in tracking and identifying potential issues.Reference:= Cisco Cybersecurity source documents or study guide
Question 66

Refer to the exhibit.
What information is depicted?
IIS data
NetFlow data
network discovery event
IPS event data
Question 67

What is the difference between the ACK flag and the RST flag in the NetFlow log session?
The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete
The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete
The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection
The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection
In NetFlow log sessions within TCP connections; ACK flag is used for acknowledging that data has been successfully received while RST flag is used when there's an error or when closing a connection spontaneously without following standard procedures.Reference:= Cisco Cybersecurity source documents or study guide
Question 68

Refer to the exhibit.
Which type of log is displayed?
proxy
NetFlow
IDS
sys
The exhibit shows a log that contains information such as the date, flow start, duration, protocol used, source and destination IP addresses and ports, packets, bytes, and flows. This type of detailed metadata is typically associated with NetFlow logs which are used for collecting IP traffic information and monitoring network traffic.Reference:=Cisco CyberOps Associate
Question 69

How is NetFlow different from traffic mirroring?
NetFlow collects metadata and traffic mirroring clones data.
Traffic mirroring impacts switch performance and NetFlow does not.
Traffic mirroring costs less to operate than NetFlow.
NetFlow generates more data than traffic mirroring.
NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network traffic. It collects metadata of the IP traffic flowing across networking devices like routers and switches. On the other hand, Traffic mirroring involves capturing all the data packets that flow through a particular point in the network to analyze or inspect them later.Reference:=Cisco Cybersecurity Operations Fundamentals
Question 70

What makes HTTPS traffic difficult to monitor?
SSL interception
packet header size
signature detection time
encryption
HTTPS uses SSL/TLS encryption to secure data transmission over the internet. This encryption makes it difficult to monitor HTTPS traffic because the data packets are encrypted making them unreadable to anyone trying to intercept or monitor the data without proper decryption keys.Reference:=Cisco CyberOps Associate
Question