Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions
Questions # 61:

A company encountered a breach on its web servers using IIS 7 5 Dunng the investigation, an engineer discovered that an attacker read and altered the data on a secure communication using TLS 1 2 and intercepted sensitive information by downgrading a connection to export-grade cryptography. The engineer must mitigate similar incidents in the future and ensure that clients and servers always negotiate with the most secure protocol versions and cryptographic parameters. Which action does the engineer recommend?

Options:

A.

Upgrade to TLS v1 3.


B.

Install the latest IIS version.


C.

Downgrade to TLS 1.1.


D.

Deploy an intrusion detection system


Expert Solution
Questions # 62:

Which security principle is violated by running all processes as root or administrator?

Options:

A.

principle of least privilege


B.

role-based access control


C.

separation of duties


D.

trusted computing base


Expert Solution
Questions # 63:

Which regular expression matches "color" and "colour"?

Options:

A.

colo?ur


B.

col[0−8]+our


C.

colou?r


D.

col[0−9]+our


Expert Solution
Questions # 64:

A user received a malicious attachment but did not run it. Which category classifies the intrusion?

Options:

A.

weaponization


B.

reconnaissance


C.

installation


D.

delivery


Expert Solution
Questions # 65:

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

Options:

A.

input validation


B.

hash collision


C.

integer overflow


D.

command injection


Expert Solution
Questions # 66:

What is a sandbox interprocess communication service?

Options:

A.

A collection of rules within the sandbox that prevent the communication between sandboxes.


B.

A collection of network services that are activated on an interface, allowing for inter-port communication.


C.

A collection of interfaces that allow for coordination of activities among processes.


D.

A collection of host services that allow for communication between sandboxes.


Expert Solution
Questions # 67:

Refer to the exhibit.

Question # 67

In which Linux log file is this output found?

Options:

A.

/var/log/authorization.log


B.

/var/log/dmesg


C.

var/log/var.log


D.

/var/log/auth.log


Expert Solution
Questions # 68:

STION NO: 102

Refer to the exhibit.

Question # 68

What is the potential threat identified in this Stealthwatch dashboard?

Options:

A.

A policy violation is active for host 10.10.101.24.


B.

A host on the network is sending a DDoS attack to another inside host.


C.

There are three active data exfiltration alerts.


D.

A policy violation is active for host 10.201.3.149.


Expert Solution
Questions # 69:

Drag and drop the type of evidence from the left onto the description of that evidence on the right.

Question # 69


Expert Solution
Questions # 70:

Which statement describes patch management?

Options:

A.

scanning servers and workstations for missing patches and vulnerabilities


B.

managing and keeping previous patches lists documented for audit purposes


C.

process of appropriate distribution of system or software updates


D.

workflow of distributing mitigations of newly found vulnerabilities


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions