Black Friday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 2 / 13
Total 451 questions

Refer to the exhibit. Where is the executable file?

A.

info

B.

tags

C.

MIME

D.

name

How does an attacker observe network traffic exchanged between two users?

A.

port scanning

B.

man-in-the-middle

C.

command injection

D.

denial of service

What is the virtual address space for a Windows process?

A.

physical location of an object in memory

B.

set of pages that reside in the physical memory

C.

system-level memory protection feature built into the operating system

D.

set of virtual memory addresses that can be used

How is attacking a vulnerability categorized?

A.

action on objectives

B.

delivery

C.

exploitation

D.

installation

Which security technology allows only a set of pre-approved applications to run on a system?

A.

application-level blacklisting

B.

host-based IPS

C.

application-level whitelisting

D.

antivirus

What is the benefit of processing statistical data for security systems?

A.

detects suspicious behavior based on traffic baselining trends

B.

uses less CPU and RAM resources than metadata-based monitoring

C.

provides fewer false negative events than full packet capture

D.

provides full visibility based on capture of packet traffic data

What is a collection of compromised machines that attackers use to carry out a DDoS attack?

A.

subnet

B.

botnet

C.

VLAN

D.

command and control

Refer to the exhibit.

What does this Cuckoo sandbox report indicate?

A.

The file is spyware.

B.

The file will open unsecure ports when executed.

C.

The file will open a command interpreter when executed.

D.

The file is ransomware.

Refer to the exhibit.

An attacker scanned the server using Nmap.

What did the attacker obtain from this scan?

A.

Identified a firewall device preventing the port state from being returned

B.

Identified open SMB ports on the server

C.

Gathered information on processes running on the server

D.

Gathered a list of Active Directory users.

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?

A.

fragmentation

B.

pivoting

C.

encryption

D.

stenography