Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Cisco CyberOps Associate 200-201 Questions and answers with Dumpstech

Exam 200-201 Premium Access

View all detail and faqs for the 200-201 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 11 out of 15 pages
Viewing questions 101-110 out of questions
Questions # 101:

In a SOC environment, what is a vulnerability management metric?

Options:

A.

code signing enforcement

B.

full assets scan

C.

internet exposed devices

D.

single factor authentication

Questions # 102:

Which two measures are used by the defense-m-depth strategy? (Choose two)

Options:

A.

Bridge the single connection into multiple.

B.

Divide the network into parts

C.

Split packets into pieces.

D.

Reduce the load on network devices.

E.

Implement the patch management process

Questions # 103:

An engineer must investigate suspicious connections. Data has been gathered using a tcpdump command on a Linux device and saved as sandboxmatware2022-12-22.pcaps file.The engineer is trying to open the tcpdump in the Wireshark tool. What is the expected result?

Options:

A.

The tool does not support Linux.

B.

The file is opened.

C.

The file has an incorrect extension.

D.

The file does not support the"-" character.

Questions # 104:

Which two attacks are denial-of-service (DoS) attacks? (Choose two.)

Options:

A.

UDP flooding

B.

Code Red

C.

man-in-the-middle

D.

ping of death

E.

TCP connections

Questions # 105:

Drag and drop the security concept on the left onto the example of that concept on the right.

Question # 105

Options:

Questions # 106:

Drag and drop the security concept on the left onto the example of that concept on the right.

Question # 106

Options:

Questions # 107:

Which of these describes volatile evidence?

Options:

A.

registers and cache

B.

logs

C.

usernames

D.

disk and removable drives

Questions # 108:

What is a description of a social engineering attack?

Options:

A.

fake offer for free music download to trick the user into providing sensitive data

B.

package deliberately sent to the wrong receiver to advertise a new product

C.

mistakenly received valuable order destined for another person and hidden on purpose

D.

email offering last-minute deals on various vacations around the world with a due date and a counter

Questions # 109:

At which layer is deep packet inspection investigated on a firewall?

Options:

A.

internet

B.

transport

C.

application

D.

data link

Questions # 110:

Which principle reduces the risk of attackers gaining access to sensitive data by compromising a low-level user account?

Options:

A.

least privilege

B.

privilege separation

C.

limited access

D.

separation of duties

Viewing page 11 out of 15 pages
Viewing questions 101-110 out of questions