Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Cisco CyberOps Associate 200-201 Questions and answers with Dumpstech

Exam 200-201 Premium Access

View all detail and faqs for the 200-201 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions
Questions # 91:

What is a difference between inline traffic interrogation and traffic mirroring?

Options:

A.

Inline inspection acts on the original traffic data flow

B.

Traffic mirroring passes live traffic to a tool for blocking

C.

Traffic mirroring inspects live traffic for analysis and mitigation

D.

Inline traffic copies packets for analysis and security

Questions # 92:

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.

What is the initial event called in the NIST SP800-61?

Options:

A.

online assault

B.

precursor

C.

trigger

D.

instigator

Questions # 93:

Refer to the exhibit.

Question # 93

During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?

Options:

A.

antivirus

B.

proxy

C.

IDS/IPS

D.

firewall

Questions # 94:

Drag and drop the technologies from the left onto the data types the technologies provide on the right.

Question # 94

Options:

Questions # 95:

Refer to exhibit.

Question # 95

An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?

Options:

A.

data encapsulation

B.

IP fragmentation

C.

code obfuscation

D.

data encryption

Questions # 96:

Why should an engineer use a full packet capture to investigate a security breach?

Options:

A.

It captures the TCP flags set within each packet for the engineer to focus on suspicious packets to identify malicious activity

B.

It collects metadata for the engineer to analyze, including IP traffic packet data that is sorted, parsed, and indexed.

C.

It provides the full TCP streams for the engineer to follow the metadata to identify the incoming threat.

D.

It reconstructs the event allowing the engineer to identify the root cause by seeing what took place during the breach

Questions # 97:

What is the principle of defense-in-depth?

Options:

A.

Agentless and agent-based protection for security are used.

B.

Several distinct protective layers are involved.

C.

Access control models are involved.

D.

Authentication, authorization, and accounting mechanisms are used.

Questions # 98:

Question # 98

Refer to the exhibit. A SOC engineer is analyzing Cuckoo Sandbox report for a file that has been identified as suspicious by the endpoint security system. What is the state of the file?

Options:

A.

The file was identified as PE32 executable with a high level of entropy to bypass AV via encryption.

B.

The file was detected as an executable binary file, but no suspicious activity was detected and it is false positive.

C.

The file was detected as executable and was marked by the SSDeep hashing algorithm as suspicious.

D.

The file identified as an executable binary for Microsoft Word with macros creating hidden process via PowerShell.

Questions # 99:

What is email greylisting as implemented by a mail transfer agent (MTA)?

Options:

A.

quarantining emails sent from outside the organization

B.

denying any email from an unrecognized sender

C.

returning emails that are potential phishing attempts

D.

allowing emails from unknown senders temporarily

Questions # 100:

Which artifact is used to uniquely identify a detected file?

Options:

A.

file timestamp

B.

file extension

C.

file size

D.

file hash

Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions