Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

This request was sent to a web application server driven by a database. Which type of web server attack is represented?

Options:

A.

parameter manipulation


B.

heap memory corruption


C.

command injection


D.

blind SQL injection


Expert Solution
Questions # 2:

What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?

Options:

A.

TAPS interrogation is more complex because traffic mirroring applies additional tags to data and SPAN does not alter integrity and provides full duplex network.


B.

SPAN results in more efficient traffic analysis, and TAPS is considerably slower due to latency caused by mirroring.


C.

TAPS replicates the traffic to preserve integrity, and SPAN modifies packets before sending them to other analysis tools


D.

SPAN ports filter out physical layer errors, making some types of analyses more difficult, and TAPS receives all packets, including physical errors.


Expert Solution
Questions # 3:

Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?

Options:

A.

The average time the SOC takes to register and assign the incident.


B.

The total incident escalations per week.


C.

The average time the SOC takes to detect and resolve the incident.


D.

The total incident escalations per month.


Expert Solution
Questions # 4:

Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)

Options:

A.

detection and analysis


B.

post-incident activity


C.

vulnerability management


D.

risk assessment


E.

vulnerability scoring


Expert Solution
Questions # 5:

Question # 5

Refer to the exhibit. A communication issue exists between hosts 192.168.0.11 and 34.253.101.190. What is a description of the initial TCP connection?

Options:

A.

Handshake has been established


B.

Fin flag is not set


C.

Reset flag is not set


D.

Acknowledge is not set


Expert Solution
Questions # 6:

Which process is used when IPS events are removed to improve data integrity?

Options:

A.

data availability


B.

data normalization


C.

data signature


D.

data protection


Expert Solution
Questions # 7:

What is a comparison between rule-based and statistical detection?

Options:

A.

Statistical is based on measured data while rule-based uses the evaluated probability approach.


B.

Rule-based Is based on assumptions and statistical uses data Known beforehand.


C.

Rule-based uses data known beforehand and statistical is based on assumptions.


D.

Statistical uses the probability approach while rule-based Is based on measured data.


Expert Solution
Questions # 8:

Drag and drop the security concept from the left onto the example of that concept on the right.

Question # 8


Expert Solution
Questions # 9:

An engineer must configure network systems to detect command-and-control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology must be used to accomplish this task?

Options:

A.

static IP addresses


B.

signatures


C.

digital certificates


D.

cipher suite


Expert Solution
Questions # 10:

What is a description of a social engineering attack?

Options:

A.

fake offer for free music download to trick the user into providing sensitive data


B.

package deliberately sent to the wrong receiver to advertise a new product


C.

mistakenly received valuable order destined for another person and hidden on purpose


D.

email offering last-minute deals on various vacations around the world with a due date and a counter


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions