Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cisco Cybersecurity Operations Fundamentals (CBROPS) Exam Prep, Exercises of Computer Networks

A collection of questions and answers related to the cisco 200-201 exam, covering topics such as cross-site scripting attacks, social engineering techniques, network security principles, and incident response procedures. It offers insights into cybersecurity operations fundamentals and can be a valuable resource for individuals preparing for the cisco 200-201 certification exam.

Typology: Exercises

2023/2024

Uploaded on 09/02/2024

beavers-kessler
beavers-kessler 🇺🇸

42 documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
https://www.leads4pass.com/200-201.html
2024 Latest leads4pass 200-201 PDF and VCE dumps Download
200-201Q&As
Understanding Cisco Cybersecurity Operations Fundamentals
(CBROPS)
Pass Cisco 200-201 Exam with 100% Guarantee
Free Download Real Questions & Answers PDF and VCE file from:
https://www.leads4pass.com/200-201.html
100% Passing Guarantee
100% Money Back Assurance
Following Questions and Answers are all new published by Cisco
Official Exam Center
Latest 200-201 Dumps | 200-201 PDF Dumps | 200-201 VCE Dumps 1 / 7
pf3
pf4
pf5

Partial preview of the text

Download Cisco Cybersecurity Operations Fundamentals (CBROPS) Exam Prep and more Exercises Computer Networks in PDF only on Docsity!

2024 Latest leads4pass 200-201 PDF and VCE dumps Download

Q&As

Understanding Cisco Cybersecurity Operations Fundamentals

(CBROPS)

Pass Cisco 200-201 Exam with 100% Guarantee

Free Download Real Questions & Answers PDF and VCE file from:

https://www.leads4pass.com/200-201.html

100% Passing Guarantee

100% Money Back Assurance

Following Questions and Answers are all new published by Cisco

Official Exam Center

2024 Latest leads4pass 200-201 PDF and VCE dumps Download

QUESTION 1

What are two types of cross site scripting attacks? (Choose two.) A. directed B. encoded C. reflected D. stored E. cascaded Correct Answer: CD

QUESTION 2 What are two social engineering techniques? (Choose two.) A. privilege escalation B. DDoS attack C. phishing D. man-in-the-middle E. pharming Correct Answer: CE

QUESTION 3 What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network? A. Tapping interrogation replicates signals to a separate port for analyzing traffic B. Tapping interrogations detect and block malicious traffic C. Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies D. Inline interrogation detects malicious traffic but does not block the traffic Correct Answer: A A network TAP is a simple device that connects directly to the cabling infrastructure to split or copy packets for use in analysis, security, or general network management

2024 Latest leads4pass 200-201 PDF and VCE dumps Download

C. var/log/var.log D. /var/log/auth.log Correct Answer: D

QUESTION 6 A SOC analyst detected connections to known CandC and port scanning activity to main HR database servers from one of the HR endpoints, via Cisco StealthWatch. What are the two next steps of the SOC team according to the NIST.SP80061 incident handling process? (Choose two.) A. Update antivirus signature databases on affected endpoints to block connections to CandC. B. Isolate affected endpoints and take disk images for analysis. C. Block connection to this CandC server on the perimeter next-generation firewall. D. Provide security awareness training to HR managers and employees E. Detect the attack vector and analyze CandC connections. Correct Answer: BE

QUESTION 7

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action? A. decision making B. rapid response C. data mining D. due diligence Correct Answer: D

QUESTION 8

Refer to the exhibit.

2024 Latest leads4pass 200-201 PDF and VCE dumps Download

Which alert is identified from this packet capture? A. man-in-the-middle attack B. brute-force attack C. ARP poisoning D. SQL injection Correct Answer: B

QUESTION 9

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.) A. Untampered images are used in the security investigation process B. Tampered images are used in the security investigation process C. The image is tampered if the stored hash and the computed hash match D. Tampered images are used in the incident recovery process E. The image is untampered if the stored hash and the computed hash match Correct Answer: AE Cert Guide by Omar Santos, Chapter 9 - Introduction to digital Forensics. "When you collect evidence, you must protect its integrity. This involves making sure that nothing is added to the evidence and that nothing is deleted or destroyed (this is known as evidence preservation)."

QUESTION 10

2024 Latest leads4pass 200-201 PDF and VCE dumps Download

QUESTION 12

Refer to the exhibit.

Which type of log is displayed? A. proxy B. NetFlow C. IDS D. sys Correct Answer: B

QUESTION 13

A company\'s cyber security team performed a phishing simulation campaign for employees and performed security awareness trainings to affected personal. According to NIST.SP800-61, at which phase of incident response is this action? A. post-incident activity phase B. detection and analyze phase C. preparation phase D. eradication and recovery phase Correct Answer: C

Latest 200-201 Dumps 200-201 PDF Dumps 200-201 VCE Dumps

Powered by TCPDF (www.tcpdf.org)

Latest 200-201 Dumps | 200-201 PDF Dumps | 200-201 VCE Dumps 7 / 7