Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 7 out of 26 pages Questions 61-70 out of 258 questions
Question#61


Refer to the exhibit. What does the message indicate?

  • A. an access attempt was made from the Mosaic web browser
  • B. a successful access attempt was made to retrieve the password file
  • C. a successful access attempt was made to retrieve the root of the website
  • D. a denied access attempt was made to retrieve the password file
Discover Answer Hide Answer

C

Question#62


Refer to the exhibit. This request was sent to a web application server driven by a database.
Which type of web server attack is represented?

  • A. parameter manipulation
  • B. heap memory corruption
  • C. command injection
  • D. blind SQL injection
Discover Answer Hide Answer

D

Question#63

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions.
Which identifier tracks an active program?

  • A. application identification number
  • B. active process identification number
  • C. runtime identification number
  • D. process identification number
Discover Answer Hide Answer

D

Question#64

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise.
Which kind of evidence is this IP address?

  • A. best evidence
  • B. corroborative evidence
  • C. indirect evidence
  • D. forensic evidence
Discover Answer Hide Answer

B

Question#65

Which system monitors local system operation and local network access for violations of a security policy?

  • A. host-based intrusion detection
  • B. systems-based sandboxing
  • C. host-based firewall
  • D. antivirus
Discover Answer Hide Answer

C

Question#66

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?

  • A. The computer has a HIPS installed on it.
  • B. The computer has a NIPS installed on it.
  • C. The computer has a HIDS installed on it.
  • D. The computer has a NIDS installed on it.
Discover Answer Hide Answer

C

Question#67


Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?

  • A. A policy violation is active for host 10.10.101.24.
  • B. A host on the network is sending a DDoS attack to another inside host.
  • C. There are three active data exfiltration alerts.
  • D. A policy violation is active for host 10.201.3.149.
Discover Answer Hide Answer

B

Question#68

What is a difference between tampered and untampered disk images?

  • A. Tampered images have the same stored and computed hash.
  • B. Untampered images are deliberately altered to preserve as evidence.
  • C. Tampered images are used as evidence.
  • D. Untampered images are used for forensic investigations.
Discover Answer Hide Answer

C

Question#69

What is a sandbox interprocess communication service?

  • A. A collection of rules within the sandbox that prevent the communication between sandboxes.
  • B. A collection of network services that are activated on an interface, allowing for inter-port communication.
  • C. A collection of interfaces that allow for coordination of activities among processes.
  • D. A collection of host services that allow for communication between sandboxes.
Discover Answer Hide Answer

C

Question#70


An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?

  • A. Base64 encoding
  • B. transport layer security encryption
  • C. SHA-256 hashing
  • D. ROT13 encryption
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right