Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 81-90 out of questions
Questions # 81:

What does the Zero Trust security model signify?

Options:

A.

Zero Trust security means that no one is trusted by default from inside or outside the network


B.

Zero Trust states that no users should be given enough privileges to misuse the system on their own


C.

Zero Trust addresses access control and states that an individual should have only the minimum access privileges necessary to perform specific tasks


D.

Zero Trust states that unless a subject is given explicit access to an object, it should be denied access to that object


Expert Solution
Questions # 82:

How is NetFlow different from traffic mirroring?

Options:

A.

NetFlow collects metadata and traffic mirroring clones data.


B.

Traffic mirroring impacts switch performance and NetFlow does not.


C.

Traffic mirroring costs less to operate than NetFlow.


D.

NetFlow generates more data than traffic mirroring.


Expert Solution
Questions # 83:

Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?

Options:

A.

Display


B.

Man-in-the-middle


C.

Distributed denial of service


D.

Denial of service


Expert Solution
Questions # 84:

What is a key difference between a tampered and an untampered disk image during a forensic investigation?

Options:

A.

An untampered image is encrypted, and a tampered one is not encrypted.


B.

A tampered image has a different hash value, and an untampered image has an unchanged hash value.


C.

A tampered image is accessible only by administrators, and an untampered one is accessible by all users.


D.

An untampered image is compressed, and a tampered one is left uncompressed.


Expert Solution
Questions # 85:

A company had a recent breach and lost confidential data to a competitor. An internal investigation found out that a new junior accounting specialist logged in to the accounting server with their user ID and stole confidential data. The junior accounting specialist denies the action and claims that the attempt was done by someone else. During court proceedings, the company presents logs and CCTV camera recordings that show the malicious insider in action. Which type of evidence has the company presented?

Options:

A.

indirect and corroborative


B.

direct and corroborative


C.

circumstantial and direct


D.

corroborative and substantive


Expert Solution
Questions # 86:

What are two differences of deep packet inspection compared to stateful firewall inspection? (Choose two.)

Options:

A.

static lists for maintaining a strict access control level


B.

offers application-level monitoring


C.

inspection of only the first packet during a connection attempt


D.

different rule configurations based on payload pattern


E.

quality of service capabilities based on list definitions


Expert Solution
Questions # 87:

An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigate this resource usage?

Options:

A.

Run "ps -d" to decrease the priority state of high load processes to avoid resource exhaustion.


B.

Run "ps -u" to find out who executed additional processes that caused a high load on a server.


C.

Run "ps -ef" to understand which processes are taking a high amount of resources.


D.

Run "ps -m" to capture the existing state of daemons and map required processes to find the gap.


Expert Solution
Questions # 88:

What makes HTTPS traffic difficult to monitor?

Options:

A.

SSL interception


B.

packet header size


C.

signature detection time


D.

encryption


Expert Solution
Questions # 89:

Which are two denial-of-service attacks? (Choose two.)

Options:

A.

TCP connections


B.

ping of death


C.

man-in-the-middle


D.

code-red


E.

UDP flooding


Expert Solution
Questions # 90:

What is a purpose of a vulnerability management framework?

Options:

A.

identifies, removes, and mitigates system vulnerabilities


B.

detects and removes vulnerabilities in source code


C.

conducts vulnerability scans on the network


D.

manages a list of reported vulnerabilities


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 81-90 out of questions