Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Which artifact is used to uniquely identify a detected file?
Which two protocols are used for DDoS amplification attacks? (Choose two.)
An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?
What are two denial-of-service (DoS) attacks? (Choose two)
A security consultant must change the identity access management model fof their organization The new approach will put responsibility on the owner, who will decide whichusers will have access to which resources Which low-cost model must be used for this purpose?
A network engineer informed a security team of a large amount of traffic and suspicious activity from an unknown source to the company DMZ server The security team reviewed the data and identified a potential DDoS attempt According to NIST, at which phase of incident response is the security team?

Refer to the exhibit. An engineer must use a 5-tuple approach to isolate a compromised host in a grouped set of logs.
Which data must the engineer use?
Why should an engineer use a full packet capture to investigate a security breach?
