Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 5 / 15
Total 476 questions

Refer to the exhibit. A security analyst examines Apache web server logs and notices the entries. Which security concern is occurring?

A.

Someone is attempting to exploit a vulnerability in XMLRPC functionality

B.

An attacker potentially gained shell access to the web server

C.

The web server is experiencing a denial-of-service attack

D.

A brute-force attack is being attempted against common administrative login pages

What is the function of a command and control server?

A.

It enumerates open ports on a network device

B.

It drops secondary payload into malware

C.

It is used to regain control of the network after a compromise

D.

It sends instruction to a compromised system

Which utility blocks a host portscan?

A.

HIDS

B.

sandboxing

C.

host-based firewall

D.

antimalware

Which two components reduce the attack surface on an endpoint? (Choose two.)

A.

secure boot

B.

load balancing

C.

increased audit log levels

D.

restricting USB ports

E.

full packet captures at the endpoint

A large load of data is being transferred to an external destination via UDP 53 port. Which obfuscation technique is used?

A.

proxied traffic

B.

C&C connection

C.

data masking

D.

DNS tunneling

Drag and drop the data sources from the left onto the corresponding data types on the right.

How is SQL injection prevented?

A.

Address space layout randomization

B.

Validate and sanitize user input

C.

...in the web server as a nonprivileged user

D.

...cost profiling

Drag and drop the access control models from the left onto the correct descriptions on the right.

A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?

A.

DNS hijacking

B.

DNS tunneling

C.

DNS flooding

D.

DNS amplification

What describes the defense-m-depth principle?

A.

defining precise guidelines for new workstation installations

B.

categorizing critical assets within the organization

C.

isolating guest Wi-Fi from the focal network

D.

implementing alerts for unexpected asset malfunctions