New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions
Questions # 41:

A security engineer must determine why a new core application does not work as desired The client can send requests toward the application server but receives no response One of the requirements is to gather all packets Data needs to be reliable without any delay or packet drops Which solution best meets this need?

Options:

A.

3 device logs


B.

span port


C.

port mirroring


D.

tap device


Expert Solution
Questions # 42:

In a SOC environment, what is a vulnerability management metric?

Options:

A.

code signing enforcement


B.

full assets scan


C.

internet exposed devices


D.

single factor authentication


Expert Solution
Questions # 43:

Drag and drop the security concept on the left onto the example of that concept on the right.

Question # 43


Expert Solution
Questions # 44:

What is the difference between the ACK flag and the RST flag?

Options:

A.

The ACK flag validates the receipt of the previous packet in the stream, and the same session is being closed by the RST flag.


B.

The ACK flag validates the next packets to be sent to a destination, and the RST flag is what the RST returns to indicate that the destination is reachable.


C.

The RST flag identifies the connection as reliable and trustworthy within the handshake process, and the ACK flag prepares a response by opening a session between the source and destination.


D.

The RST flag establishes the communication, and the ACK flag cancels spontaneous connections that were not specifically sent to the expecting host.


Expert Solution
Questions # 45:

How does certificate authority impact a security system?

Options:

A.

It authenticates client identity when requesting SSL certificate


B.

It validates domain identity of a SSL certificate


C.

It authenticates domain identity when requesting SSL certificate


D.

It validates client identity when communicating with the server


Expert Solution
Questions # 46:

Question # 46

Refer to the exhibit A penetration tester runs the Nmap scan against the company server to uncover possible vulnerabilities and exploit them Which two elements can the penetration tester identity from the scan results? (Choose two.)

Options:

A.

UIDs and group identifiers


B.

number of concurrent connections the server can handle


C.

running services and applications


D.

server uptime and internal clock


E.

server purpose and functionality


Expert Solution
Questions # 47:

An analyst received a ticket about degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed disabled antivirus software and could not determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

Options:

A.

Detection


B.

Analysis


C.

Eradication


D.

Recovery


Expert Solution
Questions # 48:

A vulnerability analyst is performing the monthly scan data review Output data is very big and getting bigger each month The analyst decides to create a more efficient process to complete the task on time All false positives and true positives are excluded from the results The remaining findings will be assigned to a technical team for further remediation What is the result of such activity?

Options:

A.

False negatives must also be excluded from the data


B.

Data is filtered property and contains only valid results


C.

Exclusion is not needed and all data must be remediated


D.

Analysis is not performed correctly, and it is missing correct data


Expert Solution
Questions # 49:

What is the difference between inline traffic interrogation and traffic mirroring?

Options:

A.

Inline interrogation is less complex as traffic mirroring applies additional tags to data.


B.

Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools


C.

Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.


D.

Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.


Expert Solution
Questions # 50:

An analyst performs traffic analysis to detect data exfiltration and identifies a high frequency of DNS requests in a small period of time Which technology makes this behavior feasible?

Options:

A.

access control list


B.

NAT


C.

tunneling


D.

encryption


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions