Exams > Cisco > 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Page 9 out of 26 pages Questions 81-90 out of 258 questions
Question#81

A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?

  • A. best evidence
  • B. prima facie evidence
  • C. indirect evidence
  • D. physical evidence
Discover Answer Hide Answer

C

Question#82

DRAG DROP -
Drag and drop the type of evidence from the left onto the description of that evidence on the right.
Select and Place:

Discover Answer Hide Answer


Question#83


Refer to the exhibit. An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?

  • A. indirect
  • B. circumstantial
  • C. corroborative
  • D. best
Discover Answer Hide Answer

D
Reference:
https://vwannabe.com/2018/01/02/ccna-cyber-ops-secops-1-0/

Question#84


Refer to the exhibit. Which piece of information is needed to search for additional downloads of this file by other hosts?

  • A. file header type
  • B. file size
  • C. file name
  • D. file hash value
Discover Answer Hide Answer

D

Question#85

An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning. How should the analyst collect the traffic to isolate the suspicious host?

  • A. based on the most used applications
  • B. by most active source IP
  • C. by most used ports
  • D. based on the protocols used
Discover Answer Hide Answer

B

Question#86

Which technology on a host is used to isolate a running application from other application?

  • A. application allow list
  • B. application block list
  • C. host-based firewall
  • D. sandbox
Discover Answer Hide Answer

D
Reference:
https://searchsecurity.techtarget.com/definition/sandbox#:~:text=Sandboxes%20can%20be%20used%20to,be%20run%20inside%20a%20sandbox

Question#87


Refer to the exhibit. Which type of attack is being executed?

  • A. cross-site request forgery
  • B. command injection
  • C. SQL injection
  • D. cross-site scripting
Discover Answer Hide Answer

C
Reference:
https://www.w3schools.com/sql/sql_injection.asp

Question#88

What is a difference between inline traffic interrogation and traffic mirroring?

  • A. Inline inspection acts on the original traffic data flow
  • B. Traffic mirroring passes live traffic to a tool for blocking
  • C. Traffic mirroring inspects live traffic for analysis and mitigation
  • D. Inline traffic copies packets for analysis and security
Discover Answer Hide Answer

B

Question#89

A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?

  • A. file extension associations
  • B. hardware, software, and security settings for the system
  • C. currently logged in users, including folders and control panel settings
  • D. all users on the system, including visual settings
Discover Answer Hide Answer

B

Question#90


Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?

  • A. 2317
  • B. 1986
  • C. 2318
  • D. 2542
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right