Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which security monitoring data type requires the largest storage space?

Options:

A.

transaction data


B.

statistical data


C.

session data


D.

full packet capture


Expert Solution
Questions # 12:

What describes the defense-m-depth principle?

Options:

A.

defining precise guidelines for new workstation installations


B.

categorizing critical assets within the organization


C.

isolating guest Wi-Fi from the focal network


D.

implementing alerts for unexpected asset malfunctions


Expert Solution
Questions # 13:

Refer to exhibit.

Question # 13

An engineer is Investigating an Intrusion and Is analyzing the pcap file. Which two key elements must an engineer consider? (Choose two.)

Options:

A.

Variable "info" field and unchanging sequence number


B.

High volume oi SYN packets with very little variance in lime


C.

identical length of 120 and window size (64)


D.

SYN packets acknowledged from several source IP addresses


E.

same source IP address with a destination port 80


Expert Solution
Questions # 14:

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.

Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

Options:

A.

signatures


B.

host IP addresses


C.

file size


D.

dropped files


E.

domain names


Expert Solution
Questions # 15:

Refer to the exhibit.

Question # 15

What does the message indicate?

Options:

A.

an access attempt was made from the Mosaic web browser


B.

a successful access attempt was made to retrieve the password file


C.

a successful access attempt was made to retrieve the root of the website


D.

a denied access attempt was made to retrieve the password file


Expert Solution
Questions # 16:

What is a ransomware attack?

Options:

A.

It is a component of a malware attack used to establish a remote covert channel.


B.

It is malicious software that steals confidential data.


C.

It encrypts a victim’s data and prevents access to it.


D.

The volume of data exceeds storage capacity.


Expert Solution
Questions # 17:

What is the difference between an attack vector and attack surface?

Options:

A.

An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.


B.

An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.


C.

An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.


D.

An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.


Expert Solution
Questions # 18:

What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?

Options:

A.

central key management server


B.

web of trust


C.

trusted certificate authorities


D.

registration authority data


Expert Solution
Questions # 19:

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.

What is the initial event called in the NIST SP800-61?

Options:

A.

online assault


B.

precursor


C.

trigger


D.

instigator


Expert Solution
Questions # 20:

An engineer must gather data for monitoring purposes from different network devices. The engineer needs to collect events from the local network and use that information for packet sniffing. The solution must create an exact copy of traffic and provide full fidelity. Which solution should the engineer use?

Options:

A.

NAT


B.

tap


C.

SPAN ports


D.

tunneling


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions