New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions
Questions # 81:

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

Options:

A.

Tapping interrogation replicates signals to a separate port for analyzing traffic


B.

Tapping interrogations detect and block malicious traffic


C.

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies


D.

Inline interrogation detects malicious traffic but does not block the traffic


Expert Solution
Questions # 82:

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Options:

A.

Hypertext Transfer Protocol


B.

SSL Certificate


C.

Tunneling


D.

VPN


Expert Solution
Questions # 83:

Refer to the exhibit.

Question # 83

What does this Cuckoo sandbox report indicate?

Options:

A.

The file is spyware.


B.

The file will open unsecure ports when executed.


C.

The file will open a command interpreter when executed.


D.

The file is ransomware.


Expert Solution
Questions # 84:

How is SQL injection prevented?

Options:

A.

Address space layout randomization


B.

Validate and sanitize user input


C.

...in the web server as a nonprivileged user


D.

...cost profiling


Expert Solution
Questions # 85:

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.

Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

Options:

A.

signatures


B.

host IP addresses


C.

file size


D.

dropped files


E.

domain names


Expert Solution
Questions # 86:

Which step in the incident response process researches an attacking host through logs in a SIEM?

Options:

A.

detection and analysis


B.

preparation


C.

eradication


D.

containment


Expert Solution
Questions # 87:

What is the difference between attack surface and vulnerability?

Options:

A.

An attack surface is a way of taking advantage of a system or resource, and a vulnerability is a specific technique utilized by the vulnerability.


B.

A vulnerability describes how software or a system is exposed to potential attacks, and an attack surface is an actual weakness that exposes the potential risk.


C.

A vulnerability is a way of taking advantage of a system or resource, and an attack surface is a specific technique utilized by the vulnerability.


D.

An attack surface describes how software or a system is exposed to potential attacks, and a vulnerability is an actual weakness that exposes the potential risk.


Expert Solution
Questions # 88:

What are two categories of DDoS attacks? (Choose two.)

Options:

A.

split brain


B.

phishing


C.

direct


D.

reflected


E.

scanning


Expert Solution
Questions # 89:

What is threat hunting?

Options:

A.

Managing a vulnerability assessment report to mitigate potential threats.


B.

Focusing on proactively detecting possible signs of intrusion and compromise.


C.

Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.


D.

Attempting to deliberately disrupt servers by altering their availability


Expert Solution
Questions # 90:

Question # 90

Refer to the exhibit. What type of event is occurring?

Options:

A.

Legitimate web browsing activity


B.

Distributed Denial of Service (DDoS) attack


C.

User trying to access a file share


D.

Malware attempting to spread laterally


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions