Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Refer to the exhibit A penetration tester runs the Nmap scan against the company server to uncover possible vulnerabilities and exploit them Which two elements can the penetration tester identity from the scan results? (Choose two.)
Refer to the exhibit.

Which attack is being attempted against a web application?
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
An engineer configured regular expression “.â€\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1 .[01]" on Cisco ASA firewall. What does this regular expression do?
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?
Drag and drop the event term from the left onto the description on the right.

An engineer is working on the implementation of digital certificates for new cntical web applications One of the requirements is that the https connection must be validated and protected against malicious network impersonators The server will be exposed externally from the DMZ network Which certificate must be used?
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

Refer to the exhibit Which TLS version does this client support?
Which type of access control depends on the job function of the user?


A screenshot of a computer
Description automatically generated