New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

Question # 21

Refer to the exhibit. A network engineer received a report that a host is communicating with unknown domains on the internet. The network engineer collected packet capture but could not determine the technique or the payload used. What technique is the attacker using?

Options:

A.

amplification


B.

teardrop


C.

session hijacking


D.

tunneling


Expert Solution
Questions # 22:

What matches the regular expression c(rgr)+e?

Options:

A.

crgrrgre


B.

np+e


C.

c(rgr)e


D.

ce


Expert Solution
Questions # 23:

Which management concept best describes developing, operating, maintaining, upgrading, and disposing of all resources?

Options:

A.

configuration


B.

vulnerability


C.

asset


D.

patch


Expert Solution
Questions # 24:

An engineer is sharing folders and files with different departments and got this error: "No such file or directory". What must the engineer verify next?

Options:

A.

memory allocation


B.

symlinks


C.

permission


D.

disk space


Expert Solution
Questions # 25:

Which items is an end-point application greylist used?

Options:

A.

Items that have been established as malicious


B.

Items that have been established as authorized


C.

Items that have been installed with a baseline


D.

Items before being established as harmful or malicious


Expert Solution
Questions # 26:

In digital communications, which method is recommended for securely exchanging public keys between users T0n2262144790 and D4n4126220794?

Options:

A.

Hardware Security Module


B.

Automated Certificate Management Environment


C.

Pretty Good Privacy


D.

Secure Multipurpose Internet Mail Extensions


Expert Solution
Questions # 27:

Question # 27

Refer to the exhibit. An engineer received a ticket to analyze unusual network traffic. What is occurring?

Options:

A.

denial-of-service attack


B.

data exfiltration


C.

regular network traffic; no suspicious activity


D.

cookie poisoning


Expert Solution
Questions # 28:

Refer to the exhibit.

Question # 28

Which type of log is displayed?

Options:

A.

proxy


B.

NetFlow


C.

IDS


D.

sys


Expert Solution
Questions # 29:

Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)

Options:

A.

detection and analysis


B.

post-incident activity


C.

vulnerability management


D.

risk assessment


E.

vulnerability scoring


Expert Solution
Questions # 30:

How does an SSL certificate impact security between the client and the server?

Options:

A.

by enabling an authenticated channel between the client and the server


B.

by creating an integrated channel between the client and the server


C.

by enabling an authorized channel between the client and the server


D.

by creating an encrypted channel between the client and the server


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions