Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions
Questions # 51:

A CMS plugin creates two files that are accessible from the Internet myplugin html and exploitable php A newly discovered exploit takes advantage of an injection vulnerability m exploitable php To exploit the vulnerability an HTTP POST must be sent with specific variables to exploitable php A security engineer notices traffic to the webserver that consists of only HTTP GET requests to myplugin html Which category does this activity fall under?

Options:

A.

weaponization


B.

installation


C.

reconnaissance


D.

exploitation


Expert Solution
Questions # 52:

Drag and drop the event term from the left onto the description on the right.

Question # 52


Expert Solution
Questions # 53:

In digital communications, which method is recommended for securely exchanging public keys between users T0n2262144790 and D4n4126220794?

Options:

A.

Hardware Security Module


B.

Automated Certificate Management Environment


C.

Pretty Good Privacy


D.

Secure Multipurpose Internet Mail Extensions


Expert Solution
Questions # 54:

Which category relates to improper use or disclosure of PII data?

Options:

A.

legal


B.

compliance


C.

regulated


D.

contractual


Expert Solution
Questions # 55:

Refer to the exhibit.

Question # 55

Which type of log is displayed?

Options:

A.

proxy


B.

NetFlow


C.

IDS


D.

sys


Expert Solution
Questions # 56:

What is a Heartbleed vulnerability?

Options:

A.

information disclosure


B.

buffer overflow


C.

denial of service


D.

command injection


Expert Solution
Questions # 57:

How does an attack surface differ from an attack vector?

Options:

A.

An attack vector recognizes the potential outcomes of an attack, and the attack surface is choosing a method of an attack.


B.

An attack surface identifies vulnerable parts for an attack, and an attack vector specifies which attacks are feasible to those parts.


C.

An attack surface mitigates external vulnerabilities, and an attack vector identifies mitigation techniques and possible workarounds.


D.

An attack vector matches components that can be exploited, and an attack surface classifies the potential path for exploitation


Expert Solution
Questions # 58:

Which of these is a defense-in-depth strategy principle?

Options:

A.

identify the minimum resource required per employee.


B.

Assign the least network privileges to segment network permissions.


C.

Provide the minimum permissions needed to perform Job functions.


D.

Disable administrative accounts to avoid unauthorized changes.


Expert Solution
Questions # 59:

Refer to the exhibit.

Question # 59

An engineer is analyzing a PCAP file after a recent breach An engineer identified that the attacker used an aggressive ARP scan to scan the hosts and found web and SSH servers. Further analysis showed several SSH Server Banner and Key Exchange Initiations. The engineer cannot see the exact data being transmitted over an encrypted channel and cannot identify how the attacker gained access How did the attacker gain access?

Options:

A.

by using the buffer overflow in the URL catcher feature for SSH


B.

by using an SSH Tectia Server vulnerability to enable host-based authentication


C.

by using an SSH vulnerability to silently redirect connections to the local host


D.

by using brute force on the SSH service to gain access


Expert Solution
Questions # 60:

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

Options:

A.

examination


B.

investigation


C.

collection


D.

reporting


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions