Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 6 / 15
Total 476 questions

Refer to the exhibit. Based on the .pcap file, which DNS server is used to resolve cisco.com?

A.

224.0.0.251

B.

192.168.2.1

C.

72.163.4.185

D.

192.168.2.104

What ate two categories of DDoS attacks? (Choose two.)

A.

split brain

B.

scanning

C.

phishing

D.

reflected

E.

direct

What are the two characteristics of the full packet captures? (Choose two.)

A.

Identifying network loops and collision domains.

B.

Troubleshooting the cause of security and performance issues.

C.

Reassembling fragmented traffic from raw data.

D.

Detecting common hardware faults and identify faulty assets.

E.

Providing a historical record of a network transaction.

What are two denial-of-service (DoS) attacks? (Choose two)

A.

port scan

B.

SYN flood

C.

man-in-the-middle

D.

phishing

E.

teardrop

What is the difference between antimalware and antivirus solutions?

A.

Antimalware applications operate proactively to block ransomware before it can encrypt data, and antivirus cannot resist advanced classes of malware.

B.

Antivirus operates using thousands of pieces of threat intelligence information from existing samples, and antimalware can identify patterns of well-known attack types and detect an attack vector before an attack is successful.

C.

Antivirus applications operate proactively to block ransomware before it can encrypt data, and antimalware cannot resist advanced classes of malware.

D.

Antimalware operates using thousands of pieces of threat intelligence information from existing samples, and antivirus can identify patterns of well-known attack types and detect an attack vector before an attack is successful.

A suspicious user opened a connection from a compromised host inside an organization. Traffic was going through a router and the network administrator was able to identify this flow. The admin was following 5-tuple to collect needed data. Which information was gathered based on this approach?

A.

direct path

B.

user name

C.

protocol

D.

NAT

A security team receives a ticket to investigate suspicious emails sent to company employees from known malicious domains. Further analysis shows that a targeted phishing attempt was successfully blocked by the company’s email antivirus. At which step of the Cyber Kill Chain did the security team mitigate this attack?

A.

Delivery

B.

Actions on Objectives

C.

Command and Control

D.

Weaponization

What is a comparison between rule-based and statistical detection?

A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.

B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.

C.

Rule-based uses data known beforehand and statistical is based on assumptions.

D.

Statistical uses the probability approach while rule-based Is based on measured data.

Which two elements are used by the defense-in-depth strategy? (Choose two)

A.

packet segmentation

B.

least privilege principle

C.

single unified security solution

D.

distributed database management system

E.

firewalls

What is corroborating evidence?

A.

Evidence that can be provided to cyber police for further restrictive actions over threat actors

B.

Evidence that can be presented in court in the original form, such as an exact copy of a hard drive

C.

Evidence that tends to support a theory or an assumption deduced by some initial evidence

D.

Evidence that relies on an extrapolation to a conclusion of fact, such as fingerprints