Cisco 200-201 Practice Test - Questions Answers, Page 8

List of questions
Question 71

How does an attacker observe network traffic exchanged between two users?
port scanning
man-in-the-middle
command injection
denial of service
A man-in-the-middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. In this scenario, an attacker can observe network traffic exchanged between two users by placing themselves in between their communication channel.Reference:= Cisco Blogs - New Cybersecurity and Cloud Skills to Protect Companies from Cybersecurity Attacks of the Future
Question 72

Which type of data consists of connection level, application-specific records generated from network traffic?
transaction data
location data
statistical data
alert data
Transaction data consists of connection level, application-specific records generated from network traffic. It provides information about the source, destination, protocol, and application of each network connection. Transaction data can be used to identify anomalies, malicious activities, and user behaviors on the network.Reference:= Cisco CyberOps Engineer
Question 73

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?
ransomware communicating after infection
users downloading copyrighted content
data exfiltration
user circumvention of the firewall
Traffic with a known TOR exit node is often associated with data exfiltration, where sensitive information is transferred from within the network to an external location. TOR networks are used to anonymize the traffic, making it difficult to trace back to the source.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 2: Security Monitoring
Question 74

What is an example of social engineering attacks?
receiving an unexpected email from an unknown person with an attachment from someone in the same company
receiving an email from human resources requesting a visit to their secure website to update contact information
sending a verbal request to an administrator who knows how to change an account password
receiving an invitation to the department's weekly WebEx meeting
Social engineering attacks are techniques that exploit human psychology and behavior to manipulate or deceive people into performing actions or divulging information that can compromise the security of the organization. An example of a social engineering attack is receiving an email from human resources requesting a visit to their secure website to update contact information. This could be a phishing attempt to trick the user into clicking on a malicious link or entering their credentials on a fake website that looks like the legitimate one.Reference:= Cisco Cybersecurity Operations Fundamentals - Module 6: Security Incident Investigations
Question 75

Refer to the exhibit.
What is occurring in this network?
Question 76

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?
Question 77

A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?
Question 78

Which vulnerability type is used to read, write, or erase information from a database?
Question 79

An automotive company provides new types of engines and special brakes for rally sports cars. The company has a database of inventions and patents for their engines and technical information Customers can access the database through the company's website after they register and identify themselves. Which type of protected data is accessed by customers?
Question 80

According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
Question