Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 12 / 15
Total 476 questions

Drag and drop the security concept from the left onto the example of that concept on the right.

Refer to the exhibit.

An attacker Infiltrated an organization's network and ran a scan to advance with the lateral movement technique. Which two elements from the scan assist the attacker? (Choose two.)

A.

function and service the server is providing

B.

CPU and vendor version of the asset

C.

running services and parts

D.

security identifiers of logged-in accounts

E.

latency and MS information to calculate delays for a command injection

What is a characteristic of a temporal score in CVSS?

A.

It can change over time

B.

It depends on the environment

C.

It has a vendor fixed value

D.

It is defined by impacted users

Which piece of information is part of the chain of custody during investigation?

A.

Method of evidence collection

B.

List of critical assets

C.

Company that was collecting evidence

D.

List of vulnerable assets

Which CVSS metric group identifies other components that are affected by a successful security attack?

A.

scope

B.

attack vector

C.

integrity

D.

privileges required

Drag and drop the type of evidence from the left onto the description of that evidence on the right.

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise.

Which kind of evidence is this IP address?

A.

best evidence

B.

corroborative evidence

C.

indirect evidence

D.

forensic evidence

How does certificate authority impact a security system?

A.

It authenticates client identity when requesting SSL certificate

B.

It validates domain identity of a SSL certificate

C.

It authenticates domain identity when requesting SSL certificate

D.

It validates client identity when communicating with the server

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

A.

X.509 certificates

B.

RADIUS server

C.

CA server

D.

web application firewall

Which tool provides a full packet capture from network traffic?

A.

Nagios

B.

CAINE

C.

Hydra

D.

Wireshark