New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

An analyst see that this security alert "Default-Botnet-Communication-Detection-By-Endpoint" has been raised from the IPS. The analyst checks and finds that an endpoint communicates to the C&C. How must an impact from this event be categorized?

Options:

A.

true positive


B.

true negative


C.

false positive


D.

false negative


Expert Solution
Questions # 72:

Drag and drop the technology on the left onto the data type the technology provides on the right.

Question # 72


Expert Solution
Questions # 73:

Developers must implement tasks on remote Windows environments. They decided to use scripts for enterprise applications through PowerShell. Why does the functionality not work?

Options:

A.

WMI must be configured.


B.

Symlinks must be enabled.


C.

Ext4 must be implemented.


D.

MBR must be set up.


Expert Solution
Questions # 74:

Which type of data consists of connection level, application-specific records generated from network traffic?

Options:

A.

transaction data


B.

location data


C.

statistical data


D.

alert data


Expert Solution
Questions # 75:

Which SOC metric represents the time to stop the incident from causing further damage to systems or data?

Options:

A.

Mean Time to Acknowledge (MTTA)


B.

Mean Time to Detect (MTTR)


C.

Mean Time to Respond (MTTR)


D.

Mean Time to Contain (MTTC)


Expert Solution
Questions # 76:

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

Options:

A.

syslog messages


B.

full packet capture


C.

NetFlow


D.

firewall event logs


Expert Solution
Questions # 77:

What is an advantage of symmetric over asymmetric encryption?

Options:

A.

A key is generated on demand according to data type.


B.

A one-time encryption key is generated for data transmission


C.

It is suited for transmitting large amounts of data.


D.

It is a faster encryption mechanism for sessions


Expert Solution
Questions # 78:

Refer to the exhibit.

Question # 78

In which Linux log file is this output found?

Options:

A.

/var/log/authorization.log


B.

/var/log/dmesg


C.

var/log/var.log


D.

/var/log/auth.log


Expert Solution
Questions # 79:

What is the purpose of command and control for network-aware malware?

Options:

A.

It contacts a remote server for commands and updates


B.

It takes over the user account for analysis


C.

It controls and shuts down services on the infected host.


D.

It helps the malware to profile the host


Expert Solution
Questions # 80:

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?

Options:

A.

companyassets that are threatened


B.

customer assets that are threatened


C.

perpetrators of the attack


D.

victims of the attack


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions