Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 11 out of 26 pages Questions 101-110 out of 258 questions
Question#101

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

  • A. AWS
  • B. IIS
  • C. Load balancer
  • D. Proxy server
Discover Answer Hide Answer

D

Question#102

Which regular expression matches "color" and "colour"?

  • A. colo?ur
  • B. col[0גˆ’8]+our
  • C. colou?r
  • D. col[0גˆ’9]+our
Discover Answer Hide Answer

C

Question#103

Which artifact is used to uniquely identify a detected file?

  • A. file timestamp
  • B. file extension
  • C. file size
  • D. file hash
Discover Answer Hide Answer

D

Question#104

A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?

  • A. application whitelisting/blacklisting
  • B. network NGFW
  • C. host-based IDS
  • D. antivirus/antispyware software
Discover Answer Hide Answer

A

Question#105

Which utility blocks a host portscan?

  • A. HIDS
  • B. sandboxing
  • C. host-based firewall
  • D. antimalware
Discover Answer Hide Answer

C

Question#106

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?

  • A. resource exhaustion
  • B. tunneling
  • C. traffic fragmentation
  • D. timing attack
Discover Answer Hide Answer

A

Question#107

DRAG DROP -
Drag and drop the technology on the left onto the data type the technology provides on the right.
Select and Place:

Discover Answer Hide Answer


Question#108


Refer to the exhibit. Which application protocol is in this PCAP file?

  • A. SSH
  • B. TCP
  • C. TLS
  • D. HTTP
Discover Answer Hide Answer

B

Question#109

DRAG DROP -

Refer to the exhibit. Drag and drop the element name from the left onto the appropriate piece of the PCAP file on the right.
Select and Place:

Discover Answer Hide Answer


Question#110


Refer to the exhibit. What is the expected result when the "Allow subdissector to reassemble TCP streams" feature is enabled?

  • A. insert TCP subdissectors
  • B. extract a file from a packet capture
  • C. disable TCP streams
  • D. unfragment TCP
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right