Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 91-100 out of questions
Questions # 91:

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

Options:

A.

forgery attack


B.

plaintext-only attack


C.

ciphertext-only attack


D.

meet-in-the-middle attack


Expert Solution
Questions # 92:

What is the dataflow set in the NetFlow flow-record format?

Options:

A.

Dataflow set is a collection of HEX records.


B.

Dataflow set provides basic information about the packet such as the NetFlow version


C.

Dataflow set is a collection of binary patterns


D.

Dataflow set is a collection of data records.


Expert Solution
Questions # 93:

An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?

Options:

A.

by most active source IP


B.

by most used ports


C.

based on the protocols used


D.

based on the most used applications


Expert Solution
Questions # 94:

Question # 94

Refer to the exhibit A SOC analyst is examining the Auth.log file logs of one the breached systems What is the possible reason for this event log?

Options:

A.

password cracking DoS attack on Windows endpoint


B.

brute force attack on Windows from 10.10.10.10


C.

regular Linux log and 10.10.10.10 is legitimate host


D.

brute force attack on Linux from 10.10.10.10


Expert Solution
Questions # 95:

Refer to the exhibit.

Question # 95

A network administrator is investigating suspicious network activity by analyzing captured traffic. An engineer notices abnormal behavior and discovers that the default user agent is present in the headers of requests and data being transmitted What is occurring?

Options:

A.

indicators of denial-of-service attack due to the frequency of requests


B.

garbage flood attack attacker is sending garbage binary data to open ports


C.

indicators of data exfiltration HTTP requests must be plain text


D.

cache bypassing attack: attacker is sending requests for noncacheable content


Expert Solution
Questions # 96:

Which type of access control depends on the job function of the user?

Options:

A.

discretionary access control


B.

nondiscretionary access control


C.

role-based access control


D.

rule-based access control


Expert Solution
Questions # 97:

Why is encryption challenging to security monitoring?

Options:

A.

Encryption analysis is used by attackers to monitor VPN tunnels.


B.

Encryption is used by threat actors as a method of evasion and obfuscation.


C.

Encryption introduces additional processing requirements by the CPU.


D.

Encryption introduces larger packet sizes to analyze and store.


Expert Solution
Questions # 98:

The security team has detected an ongoing spam campaign targeting the organization. The team's approach is to push back the cyber kill chain and mitigate ongoing incidents. At which phase of the cyber kill chain should the security team mitigate this type of attack?

Options:

A.

actions


B.

delivery


C.

reconnaissance


D.

installation


Expert Solution
Questions # 99:

In digital communications, which method is recommended for securely exchanging public keys between users T0n2262144790 and D4n4126220794?

Options:

A.

Hardware Security Module


B.

Automated Certificate Management Environment


C.

Pretty Good Privacy


D.

Secure Multipurpose Internet Mail Extensions


Expert Solution
Questions # 100:

Which statement describes indicators of attack?

Options:

A.

internal hosts communicate with countries outside of the business range.


B.

Phishing attempts on an organization are blocked by mall AV.


C.

Critical patches are missing.


D.

A malicious file is detected by the AV software.


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 91-100 out of questions