Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 4 out of 26 pages Questions 31-40 out of 258 questions
Question#31


Refer to the exhibit. What is occurring in this network traffic?

  • A. High rate of SYN packets being sent from a multiple source towards a single destination IP.
  • B. High rate of ACK packets being sent from a single source IP towards multiple destination IPs.
  • C. Flood of ACK packets coming from a single source IP to multiple destination IPs.
  • D. Flood of SYN packets coming from a single source IP to a single destination IP.
Discover Answer Hide Answer

D

Question#32

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

  • A. management and reporting
  • B. traffic filtering
  • C. adaptive AVC
  • D. metrics collection and exporting
  • E. application recognition
Discover Answer Hide Answer

DE

Question#33

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

  • A. Hypertext Transfer Protocol
  • B. SSL Certificate
  • C. Tunneling
  • D. VPN
Discover Answer Hide Answer

B

Question#34

An engineer is investigating a case of the unauthorized usage of the `Tcpdump` tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

  • A. tagged protocols being used on the network
  • B. all firewall alerts and resulting mitigations
  • C. tagged ports being used on the network
  • D. all information and data within the datagram
Discover Answer Hide Answer

A

Question#35

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

  • A. Phishing attack
  • B. Password Revelation Strategy
  • C. Piggybacking
  • D. Social Engineering
Discover Answer Hide Answer

D

Question#36

Which security monitoring data type requires the largest storage space?

  • A. transaction data
  • B. statistical data
  • C. session data
  • D. full packet capture
Discover Answer Hide Answer

D

Question#37

What are two denial of service attacks? (Choose two.)

  • A. MITM
  • B. TCP connections
  • C. ping of death
  • D. UDP flooding
  • E. code red
Discover Answer Hide Answer

CE

Question#38

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

  • A. nmap --top-ports 192.168.1.0/24
  • B. nmap ג€"sP 192.168.1.0/24
  • C. nmap -sL 192.168.1.0/24
  • D. nmap -sV 192.168.1.0/24
Discover Answer Hide Answer

B

Question#39

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

  • A. NetScout
  • B. tcpdump
  • C. SolarWinds
  • D. netsh
Discover Answer Hide Answer

B

Question#40


Refer to the exhibit. Which kind of attack method is depicted in this string?

  • A. cross-site scripting
  • B. man-in-the-middle
  • C. SQL injection
  • D. denial of service
Discover Answer Hide Answer

A

chevron rightPrevious Nextchevron right