Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions
Questions # 51:

What is data encapsulation?

Options:

A.

Browsing history is erased automatically with every session.


B.

The protocol of the sending host adds additional data to the packet header.


C.

Data is encrypted backwards, which makes it unusable.


D.

Multiple hosts can be supported with only a few public IP addresses.


Expert Solution
Questions # 52:

Which action prevents buffer overflow attacks?

Options:

A.

variable randomization


B.

using web based applications


C.

input sanitization


D.

using a Linux operating system


Expert Solution
Questions # 53:

A network engineer informed a security team of a large amount of traffic and suspicious activity from an unknown source to the company DMZ server The security team reviewed the data and identified a potential DDoS attempt According to NIST, at which phase of incident response is the security team?

Options:

A.

containment and eradication


B.

preparation


C.

recovery


D.

detection and analysis


Expert Solution
Questions # 54:

Which of these describes SOC metrics in relation to security incidents?

Options:

A.

time it takes to detect the incident


B.

time it takes to assess the risks of the incident


C.

probability of outage caused by the incident


D.

probability of compromise and impact caused by the incident


Expert Solution
Questions # 55:

What is the difference between deep packet inspection and stateful inspection?

Options:

A.

Deep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4.


B.

Deep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention.


C.

Stateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention.


D.

Stateful inspection verifies data at the transport layer and deep packet inspection verifies data at the application layer


Expert Solution
Questions # 56:

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

Options:

A.

Firepower


B.

Email Security Appliance


C.

Web Security Appliance


D.

Stealthwatch


Expert Solution
Questions # 57:

Refer to the exhibit.

Question # 57

What kind of activity occurs in the network?

Options:

A.

TCP reset attack


B.

DNS redirect attack


C.

DNS flood


D.

UDP flood


Expert Solution
Questions # 58:

Refer to the exhibit.

Question # 58

What is depicted in the exhibit?

Options:

A.

Windows Event logs


B.

Apache logs


C.

IIS logs


D.

UNIX-based syslog


Expert Solution
Questions # 59:

How low does rule-based detection differ from behavioral detection?

Options:

A.

Behavioral systems find sequences that match particular attach behaviors, and rule-based systems identify potential zero-day attacks.


B.

Rule-based systems search for patterns linked to specific types of attacks, and behavioral systems Identify attacks per signature.


C.

Behavioral systems have patterns are for complex environments, and rule-based systems can be used on low-mid-sized businesses.


D.

Rule-based systems have predefined patterns, and behavioral systems learn the patterns that are specific to the environment.


Expert Solution
Questions # 60:

Which event artifact is used to identify HTTP GET requests for a specific file?

Options:

A.

destination IP address


B.

TCP ACK


C.

HTTP status code


D.

URI


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions