Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

An engineer received an alert affecting the degraded performance of a critical server Analysis showed a heavy CPU and memory load What is the next step the engineer should take to investigate this resource usage7

Options:

A.

Run "ps -ef to understand which processes are taking a high amount of resources


B.

Run "ps -u" to find out who executed additional processes that caused a high load on a server


C.

Run "ps -m" to capture the existing state of daemons and map the required processes to find the gap


D.

Run "ps -d" to decrease the priority state of high-load processes to avoid resource exhaustion


Expert Solution
Questions # 2:

A security consultant must change the identity access management model fof their organization The new approach will put responsibility on the owner, who will decide whichusers will have access to which resources Which low-cost model must be used for this purpose?

Options:

A.

mandatory access control, due to automate scaling


B.

discretionary access control due to easy maintenance


C.

discretionary access control, due to high security


D.

mandatory access control, due to low granularity


Expert Solution
Questions # 3:

What is a difference between SIEM and SOAR?

Options:

A.

SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.


B.

SlEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.


C.

SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.


D.

SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.


Expert Solution
Questions # 4:

Which technique obtains information about how the system works without knowing it's design details?

Options:

A.

DDOS attack


B.

reverse engineering


C.

DNS spoofing


D.

malware analysis


Expert Solution
Questions # 5:

Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?

Options:

A.

command injection


B.

man in the middle attack


C.

evasion methods


D.

phishing


Expert Solution
Questions # 6:

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

Options:

A.

NetScout


B.

tcpdump


C.

SolarWinds


D.

netsh


Expert Solution
Questions # 7:

What is the function of a command and control server?

Options:

A.

It enumerates open ports on a network device


B.

It drops secondary payload into malware


C.

It is used to regain control of the network after a compromise


D.

It sends instruction to a compromised system


Expert Solution
Questions # 8:

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?

Options:

A.

companyassets that are threatened


B.

customer assets that are threatened


C.

perpetrators of the attack


D.

victims of the attack


Expert Solution
Questions # 9:

Which two elements are assets in the role of attribution in an investigation? (Choose two.)

Options:

A.

context


B.

session


C.

laptop


D.

firewall logs


E.

threat actor


Expert Solution
Questions # 10:

What is a difference between inline traffic interrogation and traffic mirroring?

Options:

A.

Inline inspection acts on the original traffic data flow


B.

Traffic mirroring passes live traffic to a tool for blocking


C.

Traffic mirroring inspects live traffic for analysis and mitigation


D.

Inline traffic copies packets for analysis and security


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions