Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 2 out of 26 pages Questions 11-20 out of 258 questions
Question#11

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

  • A. forgery attack
  • B. plaintext-only attack
  • C. ciphertext-only attack
  • D. meet-in-the-middle attack
Discover Answer Hide Answer

C

Question#12

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

  • A. ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
  • B. ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods
  • C. ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods
  • D. ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
Discover Answer Hide Answer

C

Question#13


Refer to the exhibit. Which type of log is displayed?

  • A. IDS
  • B. proxy
  • C. NetFlow
  • D. sys
Discover Answer Hide Answer

D

Question#14


Refer to the exhibit. What information is depicted?

  • A. IIS data
  • B. NetFlow data
  • C. network discovery event
  • D. IPS event data
Discover Answer Hide Answer

B

Question#15

What is the difference between the ACK flag and the RST flag in the NetFlow log session?

  • A. The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete
  • B. The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete
  • C. The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection
  • D. The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection
Discover Answer Hide Answer

D

Question#16


Refer to the exhibit. Which type of log is displayed?

  • A. proxy
  • B. NetFlow
  • C. IDS
  • D. sys
Discover Answer Hide Answer

B

Question#17

How is NetFlow different from traffic mirroring?

  • A. NetFlow collects metadata and traffic mirroring clones data.
  • B. Traffic mirroring impacts switch performance and NetFlow does not.
  • C. Traffic mirroring costs less to operate than NetFlow.
  • D. NetFlow generates more data than traffic mirroring.
Discover Answer Hide Answer

A

Question#18

What makes HTTPS traffic difficult to monitor?

  • A. SSL interception
  • B. packet header size
  • C. signature detection time
  • D. encryption
Discover Answer Hide Answer

D

Question#19

How does an attacker observe network traffic exchanged between two users?

  • A. port scanning
  • B. man-in-the-middle
  • C. command injection
  • D. denial of service
Discover Answer Hide Answer

B

Question#20

Which type of data consists of connection level, application-specific records generated from network traffic?

  • A. transaction data
  • B. location data
  • C. statistical data
  • D. alert data
Discover Answer Hide Answer

A

chevron rightPrevious Nextchevron right