Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Which of these describes volatile evidence?
Which incidence response step includes identifying all hosts affected by an attack?
Drag and drop the uses on the left onto the type of security system on the right.

A user received a malicious attachment but did not run it. Which category classifies the intrusion?
Which technique is a low-bandwidth attack?
Refer to the exhibit.

An analyst was given a PCAP file, which is associated with a recent intrusion event in the company FTP server Which display filters should the analyst use to filter the FTP traffic?
Which technique obtains information about how the system works without knowing it's design details?
Which step in the incident response process researches an attacking host through logs in a SIEM?
What is a Heartbleed vulnerability?
A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?

