Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 11 / 15
Total 476 questions

Which type of data is used to detect anomalies in the network?

A.

statistical data

B.

alert data

C.

transaction data

D.

metadata

Which event is a vishing attack?

A.

obtaining disposed documents from an organization

B.

using a vulnerability scanner on a corporate network

C.

setting up a rogue access point near a public hotspot

D.

impersonating a tech support agent during a phone call

Which data type is necessary to get information about source/destination ports?

A.

statistical data

B.

session data

C.

connectivity data

D.

alert data

A software development company develops high-end technology for the customer that will go through the HIPAA audit program. The technology will be hosted in the cloud, and the healthcare, employee names, and contact information will be stored on two separate logically isolated private cloud services. The patents and inventions will be hosted on a separate encrypted database. A compliance team is asked to analyze the cloud infrastructure and architecture to identify the protected data. Which two types of protected data should be identified? (Choose two.)

A.

Federated Identity ID (FII)

B.

Protected Health Information (PHI)

C.

Personally Identifiable Information (PII)

D.

Payment Card Industry (PCI)

E.

Self-sovereign Identity (SSI)

What is the dataflow set in the NetFlow flow-record format?

A.

Dataflow set is a collection of HEX records.

B.

Dataflow set provides basic information about the packet such as the NetFlow version

C.

Dataflow set is a collection of binary patterns

D.

Dataflow set is a collection of data records.

Drag and drop the definitions from the left onto the phases on the right to classify intrusion events according to the Cyber Kill Chain model.

Drag and drop the technologies from the left onto the data types the technologies provide on the right.

A security consultant must change the identity access management model fof their organization The new approach will put responsibility on the owner, who will decide whichusers will have access to which resources Which low-cost model must be used for this purpose?

A.

mandatory access control, due to automate scaling

B.

discretionary access control due to easy maintenance

C.

discretionary access control, due to high security

D.

mandatory access control, due to low granularity

An analyst is exploring the functionality of different operating systems.

What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

A.

queries Linux devices that have Microsoft Services for Linux installed

B.

deploys Windows Operating Systems in an automated fashion

C.

is an efficient tool for working with Active Directory

D.

has a Common Information Model, which describes installed hardware and software

Refer to the exhibit. Which alert is identified from this packet?

A.

SYN flood

B.

SSDP amplification

C.

Fraggle attack

D.

TCP fragmentation attack