Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which event artifact is used to identify HTTP GET requests for a specific file?

Options:

A.

destination IP address


B.

TCP ACK


C.

HTTP status code


D.

URI


Expert Solution
Questions # 32:

What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?

Options:

A.

MAC is controlled by the discretion of the owner and DAC is controlled by an administrator


B.

MAC is the strictest of all levels of control and DAC is object-based access


C.

DAC is controlled by the operating system and MAC is controlled by an administrator


D.

DAC is the strictest of all levels of control and MAC is object-based access


Expert Solution
Questions # 33:

Which evasion method is being used when TLS is observed between two endpoints?

Options:

A.

Obfuscation


B.

Encryption


C.

X.509 certificate authentication


D.

Traffic insertion


Expert Solution
Questions # 34:

Refer to the exhibit.

Question # 34

Which attack is being attempted against a web application?

Options:

A.

SQL injection


B.

man-in-the-middle


C.

command injection


D.

denial of service


Expert Solution
Questions # 35:

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.

Which information is available on the server certificate?

Options:

A.

server name, trusted subordinate CA, and private key


B.

trusted subordinate CA, public key, and cipher suites


C.

trusted CA name, cipher suites, and private key


D.

server name, trusted CA, and public key


Expert Solution
Questions # 36:

An analyst performs traffic analysis to detect data exfiltration and identifies a high frequency of DNS requests in a small period of time Which technology makes this behavior feasible?

Options:

A.

access control list


B.

NAT


C.

tunneling


D.

encryption


Expert Solution
Questions # 37:

During which phase of the forensic process are tools and techniques used to extract information from the collected data?

Options:

A.

investigation


B.

examination


C.

reporting


D.

collection


Expert Solution
Questions # 38:

Which management concept best describes developing, operating, maintaining, upgrading, and disposing of all resources?

Options:

A.

configuration


B.

vulnerability


C.

asset


D.

patch


Expert Solution
Questions # 39:

What is the difference between a threat and an exploit?

Options:

A.

A threat is a result of utilizing flow in a system, and an exploit is a result of gaining control over the system.


B.

A threat is a potential attack on an asset and an exploit takes advantage of the vulnerability of the asset


C.

An exploit is an attack vector, and a threat is a potential path the attack must go through.


D.

An exploit is an attack path, and a threat represents a potential vulnerability


Expert Solution
Questions # 40:

Refer to the exhibit.

Question # 40

What is the outcome of the command?

Options:

A.

TCP rule that detects TCP packets with the SYN flag in an external FTP server


B.

TCP rule that detects TCP packets with a SYN flag in the internal network


C.

TCP rule that detects TCP packets with a ACK flag in the internal network


D.

TCP rule that detects TCP packets with the ACK flag in an external FTP server


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 31-40 out of questions