Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 10 / 15
Total 476 questions

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

A.

nmap --top-ports 192.168.1.0/24

B.

nmap –sP 192.168.1.0/24

C.

nmap -sL 192.168.1.0/24

D.

nmap -sV 192.168.1.0/24

Refer to the exhibit.

Which alert is identified from this packet capture?

A.

man-in-the-middle attack

B.

ARP poisoning

C.

brute-force attack

D.

SQL injection

What is the key difference between mandatory access control (MAC) and discretionary access control (DAC)?

A.

DAC is controlled by the OS, and MAC is controlled by the owner of the access list.

B.

DAC is the most strict access control, and MAC is object-based access.

C.

MAC is controlled by the OS, and DAC is controlled by the owner of the access list.

D.

MAC is the most strict access control, and DAC is object-based access.

Refer to exhibit.

An engineer is Investigating an Intrusion and Is analyzing the pcap file. Which two key elements must an engineer consider? (Choose two.)

A.

Variable "info" field and unchanging sequence number

B.

High volume oi SYN packets with very little variance in lime

C.

identical length of 120 and window size (64)

D.

SYN packets acknowledged from several source IP addresses

E.

same source IP address with a destination port 80

What is the difference between the ACK flag and the RST flag?

A.

The ACK flag validates the receipt of the previous packet in the stream, and the same session is being closed by the RST flag.

B.

The ACK flag validates the next packets to be sent to a destination, and the RST flag is what the RST returns to indicate that the destination is reachable.

C.

The RST flag identifies the connection as reliable and trustworthy within the handshake process, and the ACK flag prepares a response by opening a session between the source and destination.

D.

The RST flag establishes the communication, and the ACK flag cancels spontaneous connections that were not specifically sent to the expecting host.

According to CVSS, which condition is required for attack complexity metrics?

A.

man-in-the-middle attack

B.

attackers altering any file

C.

complete loss of protection

D.

total loss of availability

What is the difference between deep packet inspection and stateful inspection?

A.

Stateful inspection verifies contents at Layer 4. and deep packet inspection verifies connection at Layer 7.

B.

Stateful inspection is more secure than deep packet inspection on Layer 7.

C.

Deep packet inspection is more secure than stateful inspection on Layer 4.

D.

Deep packet inspection allows visibility on Layer 7, and stateful inspection allows visibility on Layer 4.

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data. The engineer could not find an external USB device Which piece of information must an engineer use for attribution in an investigation?

A.

list of security restrictions and privileges boundaries bypassed

B.

external USB device

C.

receptionist and the actions performed

D.

stolen data and its criticality assessment

Which HTTP header field is used in forensics to identify the type of browser used?

A.

referrer

B.

host

C.

user-agent

D.

accept-language

Refer to the exhibit.

An attacker scanned the server using Nmap.

What did the attacker obtain from this scan?

A.

Identified a firewall device preventing the port state from being returned

B.

Identified open SMB ports on the server

C.

Gathered information on processes running on the server

D.

Gathered a list of Active Directory users.