Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 11 out of 13 pages
Viewing questions 101-110 out of questions
Questions # 101:

What is a benefit of agent-based protection when compared to agentless protection?

Options:

A.

It lowers maintenance costs


B.

It provides a centralized platform


C.

It collects and detects all traffic locally


D.

It manages numerous devices simultaneously


Expert Solution
Questions # 102:

Which metric is used to capture the level of access needed to launch a successful attack?

Options:

A.

privileges required


B.

user interaction


C.

attack complexity


D.

attack vector


Expert Solution
Questions # 103:

What is a difference between data obtained from Tap and SPAN ports?

Options:

A.

Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.


B.

SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.


C.

SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.


D.

Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination


Expert Solution
Questions # 104:

Which technology prevents end-device to end-device IP traceability?

Options:

A.

encryption


B.

load balancing


C.

NAT/PAT


D.

tunneling


Expert Solution
Questions # 105:

Which attack represents the evasion technique of resource exhaustion?

Options:

A.

SQL injection


B.

man-in-the-middle


C.

bluesnarfing


D.

denial-of-service


Expert Solution
Questions # 106:

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.

Question # 106


Expert Solution
Questions # 107:

What is an attack surface as compared to a vulnerability?

Options:

A.

any potential danger to an asset


B.

the sum of all paths for data into and out of the environment


C.

an exploitable weakness in a system or its design


D.

the individuals who perform an attack


Expert Solution
Questions # 108:

What matches the regular expression c(rgr)+e?

Options:

A.

crgrrgre


B.

np+e


C.

c(rgr)e


D.

ce


Expert Solution
Questions # 109:

What is a disadvantage of the asymmetric encryption system?

Options:

A.

It is slow compared to the symmetric encryption system.


B.

Asymmetric encryption is used to transfer the data, and symmetric is used to encrypt small chunks of data.


C.

Asymmetric encryption is an old technique, and symmetric encryption is the newer one.


D.

It is less secure because it uses a single key for encryption.


Expert Solution
Questions # 110:

A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?

Options:

A.

the intellectual property that was stolen


B.

the defense contractor who stored the intellectual property


C.

the method used to conduct the attack


D.

the foreign government that conducted the attack


Expert Solution
Viewing page 11 out of 13 pages
Viewing questions 101-110 out of questions