Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 21-30 out of questions
Questions # 21:

Refer to exhibit.

Question # 21

An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?

Options:

A.

data encapsulation


B.

IP fragmentation


C.

code obfuscation


D.

data encryption


Expert Solution
Questions # 22:

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

Options:

A.

Recovery


B.

Detection


C.

Eradication


D.

Analysis


Expert Solution
Questions # 23:

Which statement describes patch management?

Options:

A.

scanning servers and workstations for missing patches and vulnerabilities


B.

managing and keeping previous patches lists documented for audit purposes


C.

process of appropriate distribution of system or software updates


D.

workflow of distributing mitigations of newly found vulnerabilities


Expert Solution
Questions # 24:

How does agentless monitoring differ from agent-based monitoring?

Options:

A.

Agentless can access the data via API. While agent-base uses a less efficient method and accesses log data through WMI.


B.

Agent-based monitoring is less intrusive in gathering log data, while agentless requires open ports to fetch the logs


C.

Agent-based monitoring has a lower initial cost for deployment, while agentless monitoring requires resource-intensive deployment.


D.

Agent-based has a possibility to locally filter and transmit only valuable data, while agentless has much higher network utilization


Expert Solution
Questions # 25:

What is the impact of encapsulation on the network?

Options:

A.

Something significant is concealed from virtually separate networks.


B.

Logically separate functions in the network are abstracted from their underlying structures.


C.

Numerous local private addresses are mapped to a public one before the data is moved.


D.

Web requests are taken on behalf of users and the response is collected from the web.


Expert Solution
Questions # 26:

An engineer received a ticket to investigate a potentially malicious file detected by a malware scanner that was trying to execute multiple commands. During the initial review, the engineer discovered that the file was created two days prior. Further analyses show that the file was downloaded from a known malicious domain after a successful phishing attempt on an asset owner. At which phase of the Cyber Kill Chain was this attack mitigated?

Options:

A.

reconnaissance


B.

exploitation


C.

installation


D.

delivery


Expert Solution
Questions # 27:

Which type of evidence supports a theory or an assumption that results from initial evidence?

Options:

A.

probabilistic


B.

indirect


C.

best


D.

corroborative


Expert Solution
Questions # 28:

What is the relationship between a vulnerability and a threat?

Options:

A.

A threat exploits a vulnerability


B.

A vulnerability is a calculation of the potential loss caused by a threat


C.

A vulnerability exploits a threat


D.

A threat is a calculation of the potential loss caused by a vulnerability


Expert Solution
Questions # 29:

Question # 29

Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.

Question # 29


Expert Solution
Questions # 30:

What is data encapsulation?

Options:

A.

Browsing history is erased automatically with every session.


B.

The protocol of the sending host adds additional data to the packet header.


C.

Data is encrypted backwards, which makes it unusable.


D.

Multiple hosts can be supported with only a few public IP addresses.


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 21-30 out of questions