Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions
Questions # 31:

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?

Options:

A.

total throughput on the interface of the router and NetFlow records


B.

output of routing protocol authentication failures and ports used


C.

running processes on the applications and their total network usage


D.

deep packet captures of each application flow and duration


Expert Solution
Questions # 32:

Refer to the exhibit

Question # 32

An engineer is analyzing DNS response packets that are larger than expected The engineer looks closer and notices a lack of appropriate DNS queries What is occurring?

Options:

A.

DNS hijack attack


B.

DNS amplification attack


C.

DNS tunneling


D.

DNS cache poisoning


Expert Solution
Questions # 33:

What is the difference between vulnerability and risk?

Options:

A.

A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.


B.

A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself


C.

A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.


D.

A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit


Expert Solution
Questions # 34:

Which vulnerability type is used to read, write, or erase information from a database?

Options:

A.

cross-site scripting


B.

cross-site request forgery


C.

buffer overflow


D.

SQL injection


Expert Solution
Questions # 35:

What is the difference between a threat and a risk?

Options:

A.

Threat represents a potential danger that could take advantage of a weakness in a system


B.

Risk represents the known and identified loss or danger in the system


C.

Risk represents the nonintentional interaction with uncertainty in the system


D.

Threat represents a state of being exposed to an attack or a compromise, either physically or logically.


Expert Solution
Questions # 36:

Refer to the exhibit.

Question # 36

This request was sent to a web application server driven by a database. Which type of web server attack is represented?

Options:

A.

parameter manipulation


B.

heap memory corruption


C.

command injection


D.

blind SQL injection


Expert Solution
Questions # 37:

Which evasion method involves performing actions slower than normal to prevent detection?

Options:

A.

timing attack


B.

traffic fragmentation


C.

resource exhaustion


D.

tunneling


Expert Solution
Questions # 38:

What ate two categories of DDoS attacks? (Choose two.)

Options:

A.

split brain


B.

scanning


C.

phishing


D.

reflected


E.

direct


Expert Solution
Questions # 39:

Which step in the incident response process researches an attacking host through logs in a SIEM?

Options:

A.

detection and analysis


B.

preparation


C.

eradication


D.

containment


Expert Solution
Questions # 40:

What is the difference between authentication and authorization?

Options:

A.

Authorization is used by a server when the server needs to know exactly who is accessing resources, and authentication is a process by which a server determines the permissions.


B.

Authorization allows an engineer to control the user access level privileges to the router, and authentication is the process of giving the user-specific permissions.


C.

Authentication is coupled with authorization so that the server knows who the requestor is, and authorization is used by a requestor that knows the server.


D.

Authentication allows an engineer to identify who can connect to a router, and authorization is the function of specifying access rights and privileges to resources.


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions