Pass the Cisco CyberOps Associate 200-201 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions
Questions # 81:

Refer to the exhibit.

Question # 81

An analyst was given a PCAP file, which is associated with a recent intrusion event in the company FTP server Which display filters should the analyst use to filter the FTP traffic?

Options:

A.

dstport == FTP


B.

tcp.port==21


C.

tcpport = FTP


D.

dstport = 21


Expert Solution
Questions # 82:

Which system monitors local system operation and local network access for violations of a security policy?

Options:

A.

host-based intrusion detection


B.

systems-based sandboxing


C.

host-based firewall


D.

antivirus


Expert Solution
Questions # 83:

Which option describes indicators of attack?

Options:

A.

spam emails on an employee workstation


B.

virus detection by the AV software


C.

blocked phishing attempt on a company


D.

malware reinfection within a few minutes of removal


Expert Solution
Questions # 84:

Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?

Options:

A.

Modify the settings of the intrusion detection system.


B.

Design criteria for reviewing alerts.


C.

Redefine signature rules.


D.

Adjust the alerts schedule.


Expert Solution
Questions # 85:

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?

Options:

A.

src=10.11.0.0/16 and dst=10.11.0.0/16


B.

ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16


C.

ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16


D.

src==10.11.0.0/16 and dst==10.11.0.0/16


Expert Solution
Questions # 86:

After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?

Options:

A.

traffic fragmentation


B.

port scanning


C.

host profiling


D.

SYN flood


Expert Solution
Questions # 87:

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

Options:

A.

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods


B.

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods


C.

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods


D.

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods


Expert Solution
Questions # 88:

What is the key difference between mandatory access control (MAC) and discretionary access control (DAC)?

Options:

A.

DAC is controlled by the OS, and MAC is controlled by the owner of the access list.


B.

DAC is the most strict access control, and MAC is object-based access.


C.

MAC is controlled by the OS, and DAC is controlled by the owner of the access list.


D.

MAC is the most strict access control, and DAC is object-based access.


Expert Solution
Questions # 89:

Refer to the exhibit.

Question # 89

Which stakeholders must be involved when a company workstation is compromised?

Options:

A.

Employee 1 Employee 2, Employee 3, Employee 4, Employee 5, Employee 7


B.

Employee 1, Employee 2, Employee 4, Employee 5


C.

Employee 4, Employee 6, Employee 7


D.

Employee 2, Employee 3, Employee 4, Employee 5


Expert Solution
Questions # 90:

Refer to the exhibit.

Question # 90

Which packet contains a file that is extractable within Wireshark?

Options:

A.

2317


B.

1986


C.

2318


D.

2542


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions