Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 61-70 out of questions
Questions # 61:

An analyst must choose one source of information for further troubleshooting. A key requirement is to use low storage space over the next 12 months while being able to quickly determine the source and scope of an attack to effectively mitigate it. Which source of information should the analyst choose?

Options:

A.

SPAN port


B.

NetFlow


C.

.pcap file


D.

traffic mirroring


Expert Solution
Questions # 62:

A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does to this type of event belong?

Options:

A.

weaponization


B.

delivery


C.

exploitation


D.

reconnaissance


Expert Solution
Questions # 63:

Which attack represents the evasion technique of resource exhaustion?

Options:

A.

SQL injection


B.

man-in-the-middle


C.

bluesnarfing


D.

denial-of-service


Expert Solution
Questions # 64:

An organization that develops high-end technology is going through an internal audit The organization uses two databases The main database stores patent information and a secondary database stores employee names and contact information A compliance team is asked to analyze the infrastructure and identify protected data Which two types of protected data should be identified? (Choose two)

Options:

A.

Personally Identifiable Information (Pll)


B.

Payment Card Industry (PCI)


C.

Protected Hearth Information (PHI)


D.

Intellectual Property (IP)


E.

Sarbanes-Oxley (SOX)


Expert Solution
Questions # 65:

Refer to the exhibit.

Question # 65

What is depicted in the exhibit?

Options:

A.

Windows Event logs


B.

Apache logs


C.

IIS logs


D.

UNIX-based syslog


Expert Solution
Questions # 66:

A user received an email attachment named "Hr405-report2609-empl094.exe" but did not run it. Which category of the cyber kill chain should be assigned to this type of event?

Options:

A.

installation


B.

reconnaissance


C.

weaponization


D.

delivery


Expert Solution
Questions # 67:

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?

Options:

A.

application identification number


B.

active process identification number


C.

runtime identification number


D.

process identification number


Expert Solution
Questions # 68:

What is the purpose of a ransomware attack?

Options:

A.

to make files inaccessible by encrypting the data


B.

to decrypt encrypted data and disks


C.

to send keystrokes to a threat actor


D.

to escalate privileges


Expert Solution
Questions # 69:

What is the impact of encryption?

Options:

A.

Confidentiality of the data is kept secure and permissions are validated


B.

Data is accessible and available to permitted individuals


C.

Data is unaltered and its integrity is preserved


D.

Data is secure and unreadable without decrypting it


Expert Solution
Questions # 70:

An organization's security team detected network spikes coming from the internal network. An investigation concluded that the spike in traffic was from intensive network scanning. How must the analyst collect the traffic to isolate the suspicious host?

Options:

A.

Based on the protocols used


B.

Based on the most used applications


C.

By most used ports


D.

By most active source IP


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 61-70 out of questions