New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

What makes HTTPS traffic difficult to monitor?

Options:

A.

SSL interception


B.

packet header size


C.

signature detection time


D.

encryption


Expert Solution
Questions # 2:

Refer to the exhibit.

Question # 2

An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?

Options:

A.

The file has an embedded executable and was matched by PEiD threat signatures for further analysis.


B.

The file has an embedded non-Windows executable but no suspicious features are identified.


C.

The file has an embedded Windows 32 executable and the Yara field lists suspicious features for further analysis.


D.

The file was matched by PEiD threat signatures but no suspicious features are identified since the signature list is up to date.


Expert Solution
Questions # 3:

Which piece of information is needed for attribution in an investigation?

Options:

A.

proxy logs showing the source RFC 1918 IP addresses


B.

RDP allowed from the Internet


C.

known threat actor behavior


D.

802.1x RADIUS authentication pass arid fail logs


Expert Solution
Questions # 4:

Refer to the exhibit.

Question # 4

During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?

Options:

A.

antivirus


B.

proxy


C.

IDS/IPS


D.

firewall


Expert Solution
Questions # 5:

A network engineer informed a security team of a large amount of traffic and suspicious activity from an unknown source to the company DMZ server The security team reviewed the data and identified a potential DDoS attempt According to NIST, at which phase of incident response is the security team?

Options:

A.

containment and eradication


B.

preparation


C.

recovery


D.

detection and analysis


Expert Solution
Questions # 6:

Which type of data is used to detect anomalies in the network?

Options:

A.

statistical data


B.

alert data


C.

transaction data


D.

metadata


Expert Solution
Questions # 7:

Which category relates to improper use or disclosure of PII data?

Options:

A.

legal


B.

compliance


C.

regulated


D.

contractual


Expert Solution
Questions # 8:

What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?

Options:

A.

central key management server


B.

web of trust


C.

trusted certificate authorities


D.

registration authority data


Expert Solution
Questions # 9:

Which security technology allows only a set of pre-approved applications to run on a system?

Options:

A.

application-level blacklisting


B.

host-based IPS


C.

application-level whitelisting


D.

antivirus


Expert Solution
Questions # 10:

Which difficulty occurs when log messages are compared from two devices separated by a Layer 3 device that performs Network Address Translation?

Options:

A.

IP addresses in the log messages match


B.

Timestamps of the log messages are different.


C.

Log messages contain incorrect information


D.

IP addresses in the log messages do not match


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions