Black Friday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 7 / 13
Total 451 questions

What are two differences of deep packet inspection compared to stateful firewall inspection? (Choose two.)

A.

static lists for maintaining a strict access control level

B.

offers application-level monitoring

C.

inspection of only the first packet during a connection attempt

D.

different rule configurations based on payload pattern

E.

quality of service capabilities based on list definitions

Refer to the exhibit.

Which application protocol is in this PCAP file?

A.

SSH

B.

TCP

C.

TLS

D.

HTTP

What is a scareware attack?

A.

using the spoofed email addresses to trick people into providing login credentials

B.

overwhelming a targeted website with fake traffic

C.

gaming access to your computer and encrypting data stored on it

D.

inserting malicious code that causes popup windows with flashing colors

Which security monitoring data type requires the largest storage space?

A.

transaction data

B.

statistical data

C.

session data

D.

full packet capture

A vulnerability analyst is performing the monthly scan data review Output data is very big and getting bigger each month The analyst decides to create a more efficient process to complete the task on time All false positives and true positives are excluded from the results The remaining findings will be assigned to a technical team for further remediation What is the result of such activity?

A.

False negatives must also be excluded from the data

B.

Data is filtered property and contains only valid results

C.

Exclusion is not needed and all data must be remediated

D.

Analysis is not performed correctly, and it is missing correct data

Which two elements are used for profiling a network? (Choose two.)

A.

session duration

B.

total throughput

C.

running processes

D.

listening ports

E.

OS fingerprint

What is a characteristic of a temporal score in CVSS?

A.

It can change over time

B.

It depends on the environment

C.

It has a vendor fixed value

D.

It is defined by impacted users

Refer to the exhibit.

Which technology generates this log?

A.

NetFlow

B.

IDS

C.

web proxy

D.

firewall

An automotive company provides new types of engines and special brakes for rally sports cars. The company has a database of inventions and patents for their engines and technical information Customers can access the database through the company's website after they register and identify themselves. Which type of protected data is accessed by customers?

A.

IP data

B.

PII data

C.

PSI data

D.

PHI data

What is a description of a social engineering attack?

A.

fake offer for free music download to trick the user into providing sensitive data

B.

package deliberately sent to the wrong receiver to advertise a new product

C.

mistakenly received valuable order destined for another person and hidden on purpose

D.

email offering last-minute deals on various vacations around the world with a due date and a counter