Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions
Questions # 71:

What is threat hunting?

Options:

A.

Managing a vulnerability assessment report to mitigate potential threats.


B.

Focusing on proactively detecting possible signs of intrusion and compromise.


C.

Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.


D.

Attempting to deliberately disrupt servers by altering their availability


Expert Solution
Questions # 72:

Which type of data is used to detect anomalies in the network?

Options:

A.

statistical data


B.

alert data


C.

transaction data


D.

metadata


Expert Solution
Questions # 73:

Drag and drop the type of evidence from the left onto the description of that evidence on the right.

Question # 73


Expert Solution
Questions # 74:

What is an evasion technique?

Options:

A.

injecting insecure malicious code into an application or a system


B.

blocking digital data using one or more mathematical methods


C.

building a payload that constructs a nonexistent signature in the antivirus database


D.

deleting update sources from an intrusion prevention system database


Expert Solution
Questions # 75:

Which two measures are used by the defense-m-depth strategy? (Choose two)

Options:

A.

Bridge the single connection into multiple.


B.

Divide the network into parts


C.

Split packets into pieces.


D.

Reduce the load on network devices.


E.

Implement the patch management process


Expert Solution
Questions # 76:

A security engineer must determine why a new core application does not work as desired The client can send requests toward the application server but receives no response One of the requirements is to gather all packets Data needs to be reliable without any delay or packet drops Which solution best meets this need?

Options:

A.

3 device logs


B.

span port


C.

port mirroring


D.

tap device


Expert Solution
Questions # 77:

Refer to the exhibit.

Question # 77

What is shown in this PCAP file?

Options:

A.

Timestamps are indicated with error.


B.

The protocol is TCP.


C.

The User-Agent is Mozilla/5.0.


D.

The HTTP GET is encoded.


Expert Solution
Questions # 78:

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

Options:

A.

nmap --top-ports 192.168.1.0/24


B.

nmap –sP 192.168.1.0/24


C.

nmap -sL 192.168.1.0/24


D.

nmap -sV 192.168.1.0/24


Expert Solution
Questions # 79:

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

Options:

A.

X.509 certificates


B.

RADIUS server


C.

CA server


D.

web application firewall


Expert Solution
Questions # 80:

A security team receives a ticket to investigate suspicious emails sent to company employees from known malicious domains. Further analysis shows that a targeted phishing attempt was successfully blocked by the company’s email antivirus. At which step of the Cyber Kill Chain did the security team mitigate this attack?

Options:

A.

Delivery


B.

Actions on Objectives


C.

Command and Control


D.

Weaponization


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions