Black Friday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 3 / 13
Total 451 questions

Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?

A.

Display

B.

Man-in-the-middle

C.

Distributed denial of service

D.

Denial of service

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)

A.

Untampered images are used in the security investigation process

B.

Tampered images are used in the security investigation process

C.

The image is tampered if the stored hash and the computed hash match

D.

Tampered images are used in the incident recovery process

E.

The image is untampered if the stored hash and the computed hash match

Which artifact is used to uniquely identify a detected file?

A.

file timestamp

B.

file extension

C.

file size

D.

file hash

Which two protocols are used for DDoS amplification attacks? (Choose two.)

A.

ICMPv6

B.

DNS

C.

NTP

D.

TCP

E.

HTTP

An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?

A.

digital certificates

B.

static IP addresses

C.

signatures

D.

cipher suite

What are two denial-of-service (DoS) attacks? (Choose two)

A.

port scan

B.

SYN flood

C.

man-in-the-middle

D.

phishing

E.

teardrop

A security consultant must change the identity access management model fof their organization The new approach will put responsibility on the owner, who will decide whichusers will have access to which resources Which low-cost model must be used for this purpose?

A.

mandatory access control, due to automate scaling

B.

discretionary access control due to easy maintenance

C.

discretionary access control, due to high security

D.

mandatory access control, due to low granularity

A network engineer informed a security team of a large amount of traffic and suspicious activity from an unknown source to the company DMZ server The security team reviewed the data and identified a potential DDoS attempt According to NIST, at which phase of incident response is the security team?

A.

containment and eradication

B.

preparation

C.

recovery

D.

detection and analysis

Refer to the exhibit. An engineer must use a 5-tuple approach to isolate a compromised host in a grouped set of logs.

Which data must the engineer use?

A.

66

B.

b4:2a0ef227 83

C.

7c:5c:f8:9f:d1:fc

D.

57813

Why should an engineer use a full packet capture to investigate a security breach?

A.

It captures the TCP flags set within each packet for the engineer to focus on suspicious packets to identify malicious activity

B.

It collects metadata for the engineer to analyze, including IP traffic packet data that is sorted, parsed, and indexed.

C.

It provides the full TCP streams for the engineer to follow the metadata to identify the incoming threat.

D.

It reconstructs the event allowing the engineer to identify the root cause by seeing what took place during the breach