ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











How does an attacker observe network traffic exchanged between two users?

A.

port scanning

A.

port scanning

Answers
B.

man-in-the-middle

B.

man-in-the-middle

Answers
C.

command injection

C.

command injection

Answers
D.

denial of service

D.

denial of service

Answers
Suggested answer: B

Explanation:

A man-in-the-middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. In this scenario, an attacker can observe network traffic exchanged between two users by placing themselves in between their communication channel.Reference:= Cisco Blogs - New Cybersecurity and Cloud Skills to Protect Companies from Cybersecurity Attacks of the Future

Which type of data consists of connection level, application-specific records generated from network traffic?

A.

transaction data

A.

transaction data

Answers
B.

location data

B.

location data

Answers
C.

statistical data

C.

statistical data

Answers
D.

alert data

D.

alert data

Answers
Suggested answer: A

Explanation:

Transaction data consists of connection level, application-specific records generated from network traffic. It provides information about the source, destination, protocol, and application of each network connection. Transaction data can be used to identify anomalies, malicious activities, and user behaviors on the network.Reference:= Cisco CyberOps Engineer

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?

A.

ransomware communicating after infection

A.

ransomware communicating after infection

Answers
B.

users downloading copyrighted content

B.

users downloading copyrighted content

Answers
C.

data exfiltration

C.

data exfiltration

Answers
D.

user circumvention of the firewall

D.

user circumvention of the firewall

Answers
Suggested answer: C

Explanation:

Traffic with a known TOR exit node is often associated with data exfiltration, where sensitive information is transferred from within the network to an external location. TOR networks are used to anonymize the traffic, making it difficult to trace back to the source.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 2: Security Monitoring

What is an example of social engineering attacks?

A.

receiving an unexpected email from an unknown person with an attachment from someone in the same company

A.

receiving an unexpected email from an unknown person with an attachment from someone in the same company

Answers
B.

receiving an email from human resources requesting a visit to their secure website to update contact information

B.

receiving an email from human resources requesting a visit to their secure website to update contact information

Answers
C.

sending a verbal request to an administrator who knows how to change an account password

C.

sending a verbal request to an administrator who knows how to change an account password

Answers
D.

receiving an invitation to the department's weekly WebEx meeting

D.

receiving an invitation to the department's weekly WebEx meeting

Answers
Suggested answer: B

Explanation:

Social engineering attacks are techniques that exploit human psychology and behavior to manipulate or deceive people into performing actions or divulging information that can compromise the security of the organization. An example of a social engineering attack is receiving an email from human resources requesting a visit to their secure website to update contact information. This could be a phishing attempt to trick the user into clicking on a malicious link or entering their credentials on a fake website that looks like the legitimate one.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations

Refer to the exhibit.

What is occurring in this network?

A.

ARP cache poisoning

A.

ARP cache poisoning

Answers
B.

DNS cache poisoning

B.

DNS cache poisoning

Answers
C.

MAC address table overflow

C.

MAC address table overflow

Answers
D.

MAC flooding attack

D.

MAC flooding attack

Answers
Suggested answer: D

Explanation:

The exhibit shows a network diagram with a switch, a router, and two hosts. The switch has a MAC address table that maps the MAC addresses of the connected devices to the corresponding ports. A MAC flooding attack is a type of attack that aims to overload the switch's MAC address table by sending a large number of frames with spoofed source MAC addresses. This causes the switch to enter a fail-open mode, where it broadcasts all incoming frames to all ports, effectively turning it into a hub. This allows the attacker to sniff the traffic between the hosts and the router, or launch other attacks such as ARP spoofing or man-in-the-middle

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

A.

syslog messages

A.

syslog messages

Answers
B.

full packet capture

B.

full packet capture

Answers
C.

NetFlow

C.

NetFlow

Answers
D.

firewall event logs

D.

firewall event logs

Answers
Suggested answer: C

Explanation:

NetFlow provides a more efficient way of recording and analyzing network traffic patterns over an extended period of time compared to syslog messages, full packet capture, or firewall event logs. It collects metadata about traffic flows traversing the network devices which can be used for understanding normal baseline behavior as well as identifying anomalies.Reference:=Cisco Certified CyberOps Associate Overview

A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?

A.

post-incident activity

A.

post-incident activity

Answers
B.

detection and analysis

B.

detection and analysis

Answers
C.

preparation

C.

preparation

Answers
D.

containment, eradication, and recovery

D.

containment, eradication, and recovery

Answers
Suggested answer: B

Explanation:

The analyst is in the detection and analysis phase of the incident response process according to NIST SP800-61. In this phase, events are detected and analyzed to determine whether they constitute incidents that require a response. It involves monitoring security events or data collection, correlation, and analysis of log entries and network flow data, among others. The goal is to identify incidents quickly so that appropriate actions can be taken.Reference:= NIST SP800-61, Computer Security Incident Handling Guide, Section 3.2: Detection and Analysis

Which vulnerability type is used to read, write, or erase information from a database?

A.

cross-site scripting

A.

cross-site scripting

Answers
B.

cross-site request forgery

B.

cross-site request forgery

Answers
C.

buffer overflow

C.

buffer overflow

Answers
D.

SQL injection

D.

SQL injection

Answers
Suggested answer: D

Explanation:

SQL injection is a type of vulnerability that allows an attacker to execute malicious SQL statements on a database server. This can result in reading, writing, or erasing information from the database, as well as bypassing authentication, executing commands, or compromising the server. SQL injection exploits the lack of input validation or output encoding in web applications that interact with databases.Reference:= Cisco Cybersecurity Operations Fundamentals, Module 1: Security Concepts, Lesson 1.3: Common Network Application Operations and Attacks, Topic 1.3.2: Web Application Attacks

An automotive company provides new types of engines and special brakes for rally sports cars. The company has a database of inventions and patents for their engines and technical information Customers can access the database through the company's website after they register and identify themselves. Which type of protected data is accessed by customers?

A.

IP data

A.

IP data

Answers
B.

PII data

B.

PII data

Answers
C.

PSI data

C.

PSI data

Answers
D.

PHI data

D.

PHI data

Answers
Suggested answer: A

Explanation:

IP data stands for Intellectual Property data, which is any data that represents the creations of the mind, such as inventions, patents, designs, or artistic works. IP data is protected by law and has commercial value for its owners. In this case, the automotive company has a database of IP data for their engines and technical information, which customers can access after they register and identify themselves.Reference:= Cisco Cybersecurity Operations Fundamentals, Module 1: Security Concepts, Lesson 1.2: Data Protection, Topic 1.2.1: Data Types

According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?

A.

malware attack

A.

malware attack

Answers
B.

ransomware attack

B.

ransomware attack

Answers
C.

whale-phishing

C.

whale-phishing

Answers
D.

insider threat

D.

insider threat

Answers
Suggested answer: B

Explanation:

Ransomware is a type of malware that encrypts the victim's data and demands a ransom for the decryption key. The attacker may also threaten to publish or delete the data if the ransom is not paid. In this case, the Egregor malware is distributed through a Cobalt Strike, which is a penetration testing tool that can be used to deploy payloads on compromised systems. The malware exfiltrates the victim's data to a command and control server and uses it as leverage to extort money from the victim.Reference:= Cisco Cybersecurity Operations Fundamentals, Module 1: Security Concepts, Lesson 1.3: Common Network Application Operations and Attacks, Topic 1.3.3: Malware Attacks

Total 331 questions
Go to page: of 34