Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which event is a vishing attack?

Options:

A.

obtaining disposed documents from an organization


B.

using a vulnerability scanner on a corporate network


C.

setting up a rogue access point near a public hotspot


D.

impersonating a tech support agent during a phone call


Expert Solution
Questions # 42:

Refer to the exhibit.

Question # 42

What is the potential threat identified in this Stealthwatch dashboard?

Options:

A.

Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.


B.

Host 152.46.6.91 is being identified as a watchlist country for data transfer.


C.

Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.


D.

Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.


Expert Solution
Questions # 43:

What is the principle of defense-in-depth?

Options:

A.

Agentless and agent-based protection for security are used.


B.

Several distinct protective layers are involved.


C.

Access control models are involved.


D.

Authentication, authorization, and accounting mechanisms are used.


Expert Solution
Questions # 44:

What are the two characteristics of the full packet captures? (Choose two.)

Options:

A.

Identifying network loops and collision domains.


B.

Troubleshooting the cause of security and performance issues.


C.

Reassembling fragmented traffic from raw data.


D.

Detecting common hardware faults and identify faulty assets.


E.

Providing a historical record of a network transaction.


Expert Solution
Questions # 45:

Refer to the exhibit.

Question # 45

Which field contains DNS header information if the payload is a query or a response?

Options:

A.

Z


B.

ID


C.

TC


D.

QR


Expert Solution
Questions # 46:

Question # 46

Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.

Question # 46


Expert Solution
Questions # 47:

According to CVSS, what is a description of the attack vector score?

Options:

A.

The metric score will be larger when it is easier to physically touch or manipulate the vulnerable component


B.

It depends on how many physical and logical manipulations are possible on a vulnerable component


C.

The metric score will be larger when a remote attack is more likely.


D.

It depends on how far away the attacker is located and the vulnerable component


Expert Solution
Questions # 48:

Refer to the exhibit.

Question # 48

Which tool was used to generate this data?

Options:

A.

NetFlow


B.

dnstools


C.

firewall


D.

tcpdump


Expert Solution
Questions # 49:

Which information must an organization use to understand the threats currently targeting the organization?

Options:

A.

threat intelligence


B.

risk scores


C.

vendor suggestions


D.

vulnerability exposure


Expert Solution
Questions # 50:

An engineer configured regular expression “.”\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1 .[01]" on Cisco ASA firewall. What does this regular expression do?

Options:

A.

It captures documents in an HTTP network session.


B.

It captures .doc, .xls, and .pdf files in HTTP v1.0 and v1.1.


C.

It captures .doc, .xls, and .ppt files extensions in HTTP v1.0.


D.

It captures Word, Excel, and PowerPoint files in HTTPv1.0 and v1.1.


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions