Black Friday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Page: 8 / 13
Total 451 questions

Which of these describes volatile evidence?

A.

registers and cache

B.

logs

C.

usernames

D.

disk and removable drives

Which incidence response step includes identifying all hosts affected by an attack?

A.

detection and analysis

B.

post-incident activity

C.

preparation

D.

containment, eradication, and recovery

Drag and drop the uses on the left onto the type of security system on the right.

A user received a malicious attachment but did not run it. Which category classifies the intrusion?

A.

weaponization

B.

reconnaissance

C.

installation

D.

delivery

Which technique is a low-bandwidth attack?

A.

social engineering

B.

session hijacking

C.

evasion

D.

phishing

Refer to the exhibit.

An analyst was given a PCAP file, which is associated with a recent intrusion event in the company FTP server Which display filters should the analyst use to filter the FTP traffic?

A.

dstport == FTP

B.

tcp.port==21

C.

tcpport = FTP

D.

dstport = 21

Which technique obtains information about how the system works without knowing it's design details?

A.

DDOS attack

B.

reverse engineering

C.

DNS spoofing

D.

malware analysis

Which step in the incident response process researches an attacking host through logs in a SIEM?

A.

detection and analysis

B.

preparation

C.

eradication

D.

containment

What is a Heartbleed vulnerability?

A.

information disclosure

B.

buffer overflow

C.

denial of service

D.

command injection

A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?

A.

reconnaissance

B.

action on objectives

C.

installation

D.

exploitation