Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions
Questions # 21:

How does an attack surface differ from an attack vector?

Options:

A.

An attack vector recognizes the potential outcomes of an attack, and the attack surface is choosing a method of an attack.


B.

An attack surface identifies vulnerable parts for an attack, and an attack vector specifies which attacks are feasible to those parts.


C.

An attack surface mitigates external vulnerabilities, and an attack vector identifies mitigation techniques and possible workarounds.


D.

An attack vector matches components that can be exploited, and an attack surface classifies the potential path for exploitation


Expert Solution
Questions # 22:

When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?

Options:

A.

full packet capture


B.

NetFlow data


C.

session data


D.

firewall logs


Expert Solution
Questions # 23:

Which regular expression matches loopback IP address (127.0.0.1)?

Options:

A.

&127%0%0%1


B.

%127.0.0.1%


C.

127\.0\.0\.1


D.

127[.0.].0.\


Expert Solution
Questions # 24:

What describes the defense-m-depth principle?

Options:

A.

defining precise guidelines for new workstation installations


B.

categorizing critical assets within the organization


C.

isolating guest Wi-Fi from the focal network


D.

implementing alerts for unexpected asset malfunctions


Expert Solution
Questions # 25:

An engineer must investigate suspicious connections. Data has been gathered using a tcpdump command on a Linux device and saved as sandboxmatware2022-12-22.pcaps file.The engineer is trying to open the tcpdump in the Wireshark tool. What is the expected result?

Options:

A.

The tool does not support Linux.


B.

The file is opened.


C.

The file has an incorrect extension.


D.

The file does not support the"-" character.


Expert Solution
Questions # 26:

Question # 26

Refer to the exhibit A penetration tester runs the Nmap scan against the company server to uncover possible vulnerabilities and exploit them Which two elements can the penetration tester identity from the scan results? (Choose two.)

Options:

A.

UIDs and group identifiers


B.

number of concurrent connections the server can handle


C.

running services and applications


D.

server uptime and internal clock


E.

server purpose and functionality


Expert Solution
Questions # 27:

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?

Options:

A.

event name, log source, time, source IP, and host name


B.

protocol, source IP, source port, destination IP, and destination port


C.

event name, log source, time, source IP, and username


D.

protocol, log source, source IP, destination IP, and host name


Expert Solution
Questions # 28:

How does certificate authority impact a security system?

Options:

A.

It authenticates client identity when requesting SSL certificate


B.

It validates domain identity of a SSL certificate


C.

It authenticates domain identity when requesting SSL certificate


D.

It validates client identity when communicating with the server


Expert Solution
Questions # 29:

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)

Options:

A.

Untampered images are used in the security investigation process


B.

Tampered images are used in the security investigation process


C.

The image is tampered if the stored hash and the computed hash match


D.

Tampered images are used in the incident recovery process


E.

The image is untampered if the stored hash and the computed hash match


Expert Solution
Questions # 30:

A malicious file has been identified in a sandbox analysis tool.

Question # 30

Which piece of information is needed to search for additional downloads of this file by other hosts?

Options:

A.

file header type


B.

file size


C.

file name


D.

file hash value


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions