Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions
Questions # 111:

What is a difference between tampered and untampered disk images?

Options:

A.

Tampered images have the same stored and computed hash.


B.

Untampered images are deliberately altered to preserve as evidence.


C.

Tampered images are used as evidence.


D.

Untampered images are used for forensic investigations.


Expert Solution
Questions # 112:

What is the difference between the ACK flag and the RST flag in the NetFlow log session?

Options:

A.

The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete


B.

The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete


C.

The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection


D.

The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection


Expert Solution
Questions # 113:

Refer to the exhibit.

Question # 113

An attacker gained initial access to the company s network and ran an Nmap scan to advance with the lateral movement technique and to search the sensitive data Which two elements can an attacker identify from the scan? (Choose two.)

Options:

A.

workload and the configuration details


B.

user accounts and SID


C.

number of users and requests that the server is handling


D.

functionality and purpose of the server


E.

running services


Expert Solution
Questions # 114:

Refer to the exhibit.

Question # 114

A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded what would have occurred with stronger data visibility.

Options:

A.

The traffic would have been monitored at any segment in the network.


B.

Malicious traffic would have been blocked on multiple devices


C.

An extra level of security would have been in place


D.

Detailed information about the data in real time would have been provided


Expert Solution
Questions # 115:

How is symmetric encryption used for HTTPS connections?

Options:

A.

The symmetric encryption algorithm uses public-private certificates


B.

Encryption is based on RSA-2048


C.

The symmetric key is used for encryption


D.

The key exchange process is reliable and secure


Expert Solution
Questions # 116:

What is the purpose of command and control for network-aware malware?

Options:

A.

It contacts a remote server for commands and updates


B.

It takes over the user account for analysis


C.

It controls and shuts down services on the infected host.


D.

It helps the malware to profile the host


Expert Solution
Questions # 117:

Refer to the exhibit.

Question # 117

What does the message indicate?

Options:

A.

an access attempt was made from the Mosaic web browser


B.

a successful access attempt was made to retrieve the password file


C.

a successful access attempt was made to retrieve the root of the website


D.

a denied access attempt was made to retrieve the password file


Expert Solution
Questions # 118:

What is the benefit of processing statistical data for security systems?

Options:

A.

detects suspicious behavior based on traffic baselining trends


B.

uses less CPU and RAM resources than metadata-based monitoring


C.

provides fewer false negative events than full packet capture


D.

provides full visibility based on capture of packet traffic data


Expert Solution
Questions # 119:

Refer to the exhibit.

Question # 119

Which application-level protocol is being targeted?

Options:

A.

HTTPS


B.

FTP


C.

HTTP


D.

TCP


Expert Solution
Questions # 120:

Refer to the exhibit.

Question # 120

Which kind of attack method is depicted in this string?

Options:

A.

cross-site scripting


B.

man-in-the-middle


C.

SQL injection


D.

denial of service


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions