Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 12 out of 26 pages Questions 111-120 out of 258 questions
Question#111

What is a difference between SOAR and SIEM?

  • A. SOAR platforms are used for threat and vulnerability management, but SIEM applications are not
  • B. SIEM applications are used for threat and vulnerability management, but SOAR platforms are not
  • C. SOAR receives information from a single platform and delivers it to a SIEM
  • D. SIEM receives information from a single platform and delivers it to a SOAR
Discover Answer Hide Answer

A

Question#112

What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?

  • A. MAC is controlled by the discretion of the owner and DAC is controlled by an administrator
  • B. MAC is the strictest of all levels of control and DAC is object-based access
  • C. DAC is controlled by the operating system and MAC is controlled by an administrator
  • D. DAC is the strictest of all levels of control and MAC is object-based access
Discover Answer Hide Answer

B

Question#113

What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?

  • A. least privilege
  • B. need to know
  • C. integrity validation
  • D. due diligence
Discover Answer Hide Answer

A

Question#114

What is the virtual address space for a Windows process?

  • A. physical location of an object in memory
  • B. set of pages that reside in the physical memory
  • C. system-level memory protection feature built into the operating system
  • D. set of virtual memory addresses that can be used
Discover Answer Hide Answer

D

Question#115

Which security principle is violated by running all processes as root or administrator?

  • A. principle of least privilege
  • B. role-based access control
  • C. separation of duties
  • D. trusted computing base
Discover Answer Hide Answer

A

Question#116

Which type of data collection requires the largest amount of storage space?

  • A. alert data
  • B. transaction data
  • C. session data
  • D. full packet capture
Discover Answer Hide Answer

D

Question#117

An analyst discovers that a legitimate security alert has been dismissed.
Which signature caused this impact on network traffic?

  • A. true negative
  • B. false negative
  • C. false positive
  • D. true positive
Discover Answer Hide Answer

B

Question#118

Which signature impacts network traffic by causing legitimate traffic to be blocked?

  • A. false negative
  • B. true positive
  • C. true negative
  • D. false positive
Discover Answer Hide Answer

D

Question#119

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)

  • A. UDP port to which the traffic is destined
  • B. TCP port from which the traffic was sourced
  • C. source IP address of the packet
  • D. destination IP address of the packet
  • E. UDP port from which the traffic is sourced
Discover Answer Hide Answer

CD

Question#120

Which HTTP header field is used in forensics to identify the type of browser used?

  • A. referrer
  • B. host
  • C. user-agent
  • D. accept-language
Discover Answer Hide Answer

C

chevron rightPrevious Nextchevron right