Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 10 out of 26 pages Questions 91-100 out of 258 questions
Question#91

Which regex matches only on all lowercase letters?

  • A. [aגˆ’z]+
  • B. [^aגˆ’z]+
  • C. aגˆ’z+
  • D. a*z+
Discover Answer Hide Answer

A

Question#92

While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header.
Which technology makes this behavior possible?

  • A. encapsulation
  • B. TOR
  • C. tunneling
  • D. NAT
Discover Answer Hide Answer

D

Question#93

Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?

  • A. Modify the settings of the intrusion detection system.
  • B. Design criteria for reviewing alerts.
  • C. Redefine signature rules.
  • D. Adjust the alerts schedule.
Discover Answer Hide Answer

A

Question#94

What is the impact of false positive alerts on business compared to true positive?

  • A. True positives affect security as no alarm is raised when an attack has taken place, while false positives are alerts raised appropriately to detect and further mitigate them.
  • B. True-positive alerts are blocked by mistake as potential attacks, while False-positives are actual attacks identified as harmless.
  • C. False positives alerts are manually ignored signatures to avoid warnings that are already acknowledged, while true positives are warnings that are not yet acknowledged.
  • D. False-positive alerts are detected by confusion as potential attacks, while true positives are attack attempts identified appropriately.
Discover Answer Hide Answer

D

Question#95

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

  • A. Firepower
  • B. Email Security Appliance
  • C. Web Security Appliance
  • D. Stealthwatch
Discover Answer Hide Answer

D

Question#96


Refer to the exhibit. Which technology generates this log?

  • A. NetFlow
  • B. IDS
  • C. web proxy
  • D. firewall
Discover Answer Hide Answer

D

Question#97

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?

  • A. src=10.11.0.0/16 and dst=10.11.0.0/16
  • B. ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16
  • C. ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16
  • D. src==10.11.0.0/16 and dst==10.11.0.0/16
Discover Answer Hide Answer

B

Question#98

Which tool provides a full packet capture from network traffic?

  • A. Nagios
  • B. CAINE
  • C. Hydra
  • D. Wireshark
Discover Answer Hide Answer

D

Question#99

A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?

  • A. total throughput on the interface of the router and NetFlow records
  • B. output of routing protocol authentication failures and ports used
  • C. running processes on the applications and their total network usage
  • D. deep packet captures of each application flow and duration
Discover Answer Hide Answer

D

Question#100


Refer to the exhibit. What is depicted in the exhibit?

  • A. Windows Event logs
  • B. Apache logs
  • C. IIS logs
  • D. UNIX-based syslog
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right