Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

A system administrator is ensuring that specific registry information is accurate.

Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?

Options:

A.

file extension associations


B.

hardware, software, and security settings for the system


C.

currently logged in users, including folders and control panel settings


D.

all users on the system, including visual settings


Expert Solution
Questions # 72:

What is the difference between inline traffic interrogation and traffic mirroring?

Options:

A.

Inline interrogation is less complex as traffic mirroring applies additional tags to data.


B.

Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools


C.

Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.


D.

Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.


Expert Solution
Questions # 73:

What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?

Options:

A.

TAPS interrogation is more complex because traffic mirroring applies additional tags to data and SPAN does not alter integrity and provides full duplex network.


B.

SPAN results in more efficient traffic analysis, and TAPS is considerably slower due to latency caused by mirroring.


C.

TAPS replicates the traffic to preserve integrity, and SPAN modifies packets before sending them to other analysis tools


D.

SPAN ports filter out physical layer errors, making some types of analyses more difficult, and TAPS receives all packets, including physical errors.


Expert Solution
Questions # 74:

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

Options:

A.

integrity


B.

confidentiality


C.

availability


D.

scope


Expert Solution
Questions # 75:

An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?

Options:

A.

The threat actor used a dictionary-based password attack to obtain credentials.


B.

The threat actor gained access to the system by known credentials.


C.

The threat actor used the teardrop technique to confuse and crash login services.


D.

The threat actor used an unknown vulnerability of the operating system that went undetected.


Expert Solution
Questions # 76:

How can TOR impact data visibility inside an organization?

Options:

A.

increases data integrity


B.

increases security


C.

decreases visibility


D.

no impact


Expert Solution
Questions # 77:

What is a difference between an inline and a tap mode traffic monitoring?

Options:

A.

Inline monitors traffic without examining other devices, while a tap mode tags traffic and examines the data from monitoring devices.


B.

Tap mode monitors traffic direction, while inline mode keeps packet data as it passes through the monitoring devices.


C.

Tap mode monitors packets and their content with the highest speed, while the inline mode draws a packet path for analysis.


D.

Inline mode monitors traffic path, examining any traffic at a wire speed, while a tap mode monitors traffic as it crosses the network.


Expert Solution
Questions # 78:

At a company party a guest asks questions about the company’s user account format and password complexity. How is this type of conversation classified?

Options:

A.

Phishing attack


B.

Password Revelation Strategy


C.

Piggybacking


D.

Social Engineering


Expert Solution
Questions # 79:

An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?

Options:

A.

phishing email


B.

sender


C.

HR


D.

receiver


Expert Solution
Questions # 80:

Which data capture includes payload and header information?

Options:

A.

frame check sequence


B.

full packet


C.

alert data


D.

session logs


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions