Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Cisco CyberOps Associate 200-201 Questions and answers with Dumpstech

Exam 200-201 Premium Access

View all detail and faqs for the 200-201 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 14 out of 15 pages
Viewing questions 131-140 out of questions
Questions # 131:

Drag and drop the elements from the left into the correct order for incident handling on the right.

Question # 131

Options:

Questions # 132:

Refer to the exhibit.

Question # 132

Which application protocol is in this PCAP file?

Options:

A.

SSH

B.

TCP

C.

TLS

D.

HTTP

Questions # 133:

What is a characteristic of a temporal score in CVSS?

Options:

A.

It can change over time

B.

It depends on the environment

C.

It has a vendor fixed value

D.

It is defined by impacted users

Questions # 134:

How is NetFlow different from traffic mirroring?

Options:

A.

NetFlow collects metadata and traffic mirroring clones data.

B.

Traffic mirroring impacts switch performance and NetFlow does not.

C.

Traffic mirroring costs less to operate than NetFlow.

D.

NetFlow generates more data than traffic mirroring.

Questions # 135:

Refer to the exhibit.

Question # 135

A company's user HTTP connection to a malicious site was blocked according to configured policy What is the source technology used for this measure'?

Options:

A.

network application control

B.

firewall

C.

IPS

D.

web proxy

Questions # 136:

Which information must an organization use to understand the threats currently targeting the organization?

Options:

A.

threat intelligence

B.

risk scores

C.

vendor suggestions

D.

vulnerability exposure

Questions # 137:

Which attack method intercepts traffic on a switched network?

Options:

A.

denial of service

B.

ARP cache poisoning

C.

DHCP snooping

D.

command and control

Questions # 138:

What is the impact of encryption?

Options:

A.

Confidentiality of the data is kept secure and permissions are validated

B.

Data is accessible and available to permitted individuals

C.

Data is unaltered and its integrity is preserved

D.

Data is secure and unreadable without decrypting it

Questions # 139:

What is an attack surface as compared to a vulnerability?

Options:

A.

any potential danger to an asset

B.

the sum of all paths for data into and out of the environment

C.

an exploitable weakness in a system or its design

D.

the individuals who perform an attack

Questions # 140:

Refer to the exhibit.

Question # 140

A SOC analyst received a message from SIEM about abnormal activity on the Windows server The analyst checked the Windows event log and saw numerous Audit Failures logs. What is occurring?

Options:

A.

Windows failed to audit the logs

B.

regular Windows log

C.

brute-force attack

D.

DoS attack

Viewing page 14 out of 15 pages
Viewing questions 131-140 out of questions