Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 14 / 15
Total 476 questions

What is a Heartbleed vulnerability?

A.

information disclosure

B.

buffer overflow

C.

denial of service

D.

command injection

In a SOC environment, what is a vulnerability management metric?

A.

code signing enforcement

B.

full assets scan

C.

internet exposed devices

D.

single factor authentication

What is the difference between an attack vector and an attack surface?

A.

Attack vectors are flaws in configuration, and the attack surface is the system or software that has such flaws.

B.

The attack vector targets security weaknesses, and the attack surface is where an adversary attempts to gain entry across those weaknesses.

C.

The attack surface is tactics, techniques, and procedures used by the threat actor, and the attack vector is the system hardware.

D.

The attack surface defines the number of existing vulnerabilities available, and the attack vector determines the difficulty of available exploits.

What is a benefit of agent-based protection when compared to agentless protection?

A.

It lowers maintenance costs

B.

It provides a centralized platform

C.

It collects and detects all traffic locally

D.

It manages numerous devices simultaneously

What is obtained using NetFlow?

A.

session data

B.

application logs

C.

network downtime report

D.

full packet capture

Refer to the exhibit.

What is occurring in this network?

A.

ARP cache poisoning

B.

DNS cache poisoning

C.

MAC address table overflow

D.

MAC flooding attack

What is the purpose of command and control for network-aware malware?

A.

It contacts a remote server for commands and updates

B.

It takes over the user account for analysis

C.

It controls and shuts down services on the infected host.

D.

It helps the malware to profile the host

Refer to the exhibit.

A company's user HTTP connection to a malicious site was blocked according to configured policy What is the source technology used for this measure'?

A.

network application control

B.

firewall

C.

IPS

D.

web proxy

Refer to the exhibit.

A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?

A.

indirect evidence

B.

best evidence

C.

corroborative evidence

D.

direct evidence

Refer to the exhibit.

What should be interpreted from this packet capture?

A.

81.179.179.69 is sending a packet from port 80 to port 50272 of IP address 192.168.122.100 using UDP protocol.

B.

192.168.122.100 is sending a packet from port 50272 to port 80 of IP address 81.179.179.69 using TCP protocol.

C.

192.168.122.100 is sending a packet from port 80 to port 50272 of IP address 81.179.179.69 using UDP protocol.

D.

81.179.179.69 is sending a packet from port 50272 to port 80 of IP address 192.168.122.100 using TCP UDP protocol.