Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Cisco CyberOps Associate 200-201 Questions and answers with Dumpstech

Exam 200-201 Premium Access

View all detail and faqs for the 200-201 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 9 out of 15 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which evasion method is being used when TLS is observed between two endpoints?

Options:

A.

Obfuscation

B.

Encryption

C.

X.509 certificate authentication

D.

Traffic insertion

Questions # 82:

Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?

Options:

A.

The average time the SOC takes to register and assign the incident.

B.

The total incident escalations per week.

C.

The average time the SOC takes to detect and resolve the incident.

D.

The total incident escalations per month.

Questions # 83:

Which tool gives the ability to see session data in real time?

Options:

A.

tcpdstat

B.

trafdump

C.

tcptrace

D.

trafshow

Questions # 84:

What is the impact of false negative alerts when compared to true negative alerts?

Options:

A.

A true negative is a legitimate attack that triggers a brute force alert, and a false negative is when no alert and no attack is occurring.

B.

A true negative is an alert for an exploit attempt when no attack was detected, and a false negative is when no attack happens and an alert is still raised.

C.

A false negative is an event that alerts for injection attack when no attack is happening, and a true negative is an attack that happens and an alert that is appropriately raised.

D.

A false negative is someone trying to hack into the system and no alert is raised, and a true negative is an event that never happened and an alert was not raised.

Questions # 85:

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

Options:

A.

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

B.

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods

C.

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods

D.

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

Questions # 86:

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

Options:

A.

examination

B.

investigation

C.

collection

D.

reporting

Questions # 87:

How is attacking a vulnerability categorized?

Options:

A.

action on objectives

B.

delivery

C.

exploitation

D.

installation

Questions # 88:

Refer to the exhibit.

Question # 88

What should be interpreted from this packet capture?

Options:

A.

81.179.179.69 is sending a packet from port 80 to port 50272 of IP address 192.168.122.100 using UDP protocol.

B.

192.168.122.100 is sending a packet from port 50272 to port 80 of IP address 81.179.179.69 using TCP protocol.

C.

192.168.122.100 is sending a packet from port 80 to port 50272 of IP address 81.179.179.69 using UDP protocol.

D.

81.179.179.69 is sending a packet from port 50272 to port 80 of IP address 192.168.122.100 using TCP UDP protocol.

Questions # 89:

What is a description of "phishing" as a social engineering attack"?

Options:

A.

Someone without the proper authentication follows an authenticated employee into a restricted area The attacker might impersonate a delivery driver and wait outside a building to get things started

B.

A hacker masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message The recipient is then tricked into clicking a malicious link.

C.

The attacker focuses on creating a good pretext or a fabricated scenario that is used to try and steal victims' personal information

D.

Fake Social Security Administration personnel contact random individuals inform them that there has been a computer problem on their end and ask that those individuals confirm their Social Security Number, all for the purpose of committing identity theft.

Questions # 90:

What is a Heartbleed vulnerability?

Options:

A.

information disclosure

B.

buffer overflow

C.

denial of service

D.

command injection

Viewing page 9 out of 15 pages
Viewing questions 81-90 out of questions