ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

How does an attacker observe network traffic exchanged between two users?

port scanning

port scanning

man-in-the-middle

man-in-the-middle

command injection

command injection

denial of service

denial of service

Suggested answer: B
Explanation:

A man-in-the-middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. In this scenario, an attacker can observe network traffic exchanged between two users by placing themselves in between their communication channel.Reference:= Cisco Blogs - New Cybersecurity and Cloud Skills to Protect Companies from Cybersecurity Attacks of the Future

asked 07/10/2024
FARIZA MANNAN
44 questions

Question 72

Report Export Collapse

Which type of data consists of connection level, application-specific records generated from network traffic?

transaction data

transaction data

location data

location data

statistical data

statistical data

alert data

alert data

Suggested answer: A
Explanation:

Transaction data consists of connection level, application-specific records generated from network traffic. It provides information about the source, destination, protocol, and application of each network connection. Transaction data can be used to identify anomalies, malicious activities, and user behaviors on the network.Reference:= Cisco CyberOps Engineer

asked 07/10/2024
gokulakrishna S B
40 questions

Question 73

Report Export Collapse

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?

ransomware communicating after infection

ransomware communicating after infection

users downloading copyrighted content

users downloading copyrighted content

data exfiltration

data exfiltration

user circumvention of the firewall

user circumvention of the firewall

Suggested answer: C
Explanation:

Traffic with a known TOR exit node is often associated with data exfiltration, where sensitive information is transferred from within the network to an external location. TOR networks are used to anonymize the traffic, making it difficult to trace back to the source.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 2: Security Monitoring

asked 07/10/2024
Farah Fauzi
46 questions

Question 74

Report Export Collapse

What is an example of social engineering attacks?

receiving an unexpected email from an unknown person with an attachment from someone in the same company

receiving an unexpected email from an unknown person with an attachment from someone in the same company

receiving an email from human resources requesting a visit to their secure website to update contact information

receiving an email from human resources requesting a visit to their secure website to update contact information

sending a verbal request to an administrator who knows how to change an account password

sending a verbal request to an administrator who knows how to change an account password

receiving an invitation to the department's weekly WebEx meeting

receiving an invitation to the department's weekly WebEx meeting

Suggested answer: B
Explanation:

Social engineering attacks are techniques that exploit human psychology and behavior to manipulate or deceive people into performing actions or divulging information that can compromise the security of the organization. An example of a social engineering attack is receiving an email from human resources requesting a visit to their secure website to update contact information. This could be a phishing attempt to trick the user into clicking on a malicious link or entering their credentials on a fake website that looks like the legitimate one.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

asked 07/10/2024
lance bonczkiewicz
36 questions

Question 75

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 75 109252 10072024004349000000

What is occurring in this network?

Become a Premium Member for full access
  Unlock Premium Member

Question 76

Report Export Collapse

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

Become a Premium Member for full access
  Unlock Premium Member

Question 77

Report Export Collapse

A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?

Become a Premium Member for full access
  Unlock Premium Member

Question 78

Report Export Collapse

Which vulnerability type is used to read, write, or erase information from a database?

Become a Premium Member for full access
  Unlock Premium Member

Question 79

Report Export Collapse

An automotive company provides new types of engines and special brakes for rally sports cars. The company has a database of inventions and patents for their engines and technical information Customers can access the database through the company's website after they register and identify themselves. Which type of protected data is accessed by customers?

Become a Premium Member for full access
  Unlock Premium Member

Question 80

Report Export Collapse

According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38