200-201 CBROPS
200-201 CBROPS
200-201 CBROPS
200-201 Dumps
https://www.certleader.com/200-201-dumps.html
NEW QUESTION 1
Which regex matches only on all lowercase letters?
A. [az]+
B. [^az]+
C. az+
D. a*z+
Answer: A
NEW QUESTION 2
An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled
antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this
investigation?
A. Recovery
B. Detection
C. Eradication
D. Analysis
Answer: B
NEW QUESTION 3
What is a difference between inline traffic interrogation and traffic mirroring?
Answer: A
Explanation:
Inline traffic interrogation analyzes traffic in real time and has the ability to prevent certain traffic from being forwarded Traffic mirroring doesn't pass the live traffic
instead it copies traffic from one or more source ports and sends the copied traffic to one or more destinations for analysis by a network analyzer or other
monitoring device
NEW QUESTION 4
What is the difference between deep packet inspection and stateful inspection?
A. Stateful inspection verifies contents at Layer 4. and deep packet inspection verifies connection at Layer 7.
B. Stateful inspection is more secure than deep packet inspection on Layer 7.
C. Deep packet inspection is more secure than stateful inspection on Layer 4.
D. Deep packet inspection allows visibility on Layer 7, and stateful inspection allows visibility on Layer 4.
Answer: D
NEW QUESTION 5
Which incidence response step includes identifying all hosts affected by an attack?
Answer: D
Explanation:
* 3.3.3 Identifying the Attacking Hosts During incident handling, system owners and others sometimes want to or need to identify the attacking host or hosts.
Although this information can be important, incident handlers should generally stay focused on containment, eradication, and recovery.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
The response phase, or containment, of incident response, is the point at which the incident response team begins interacting with affected systems and attempts
to keep further damage from occurring as a result of the incident.
NEW QUESTION 6
What is an advantage of symmetric over asymmetric encryption?
Answer: D
NEW QUESTION 7
What is a collection of compromised machines that attackers use to carry out a DDoS attack?
A. subnet
B. botnet
C. VLAN
D. command and control
Answer: B
NEW QUESTION 8
Drag and drop the type of evidence from the left onto the description of that evidence on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Graphical user interface, application Description automatically generated
NEW QUESTION 9
A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?
Answer: B
Explanation:
https://docs.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users
NEW QUESTION 10
What is a benefit of using asymmetric cryptography?
Answer: C
NEW QUESTION 10
An automotive company provides new types of engines and special brakes for rally sports cars. The company has a database of inventions and patents for their
engines and technical information Customers can access the database through the company's website after they register and identify themselves. Which type of
protected data is accessed by customers?
A. IP data
B. PII data
C. PSI data
D. PHI data
Answer: B
NEW QUESTION 13
Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?
A. resource exhaustion
B. tunneling
C. traffic fragmentation
D. timing attack
Answer: A
Explanation:
Resource exhaustion is a type of denial-of-service attack; however, it can also be used to evade detection by security defenses. A simple definition of resource
exhaustion is “consuming the resources necessary to
perform an action.” Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
NEW QUESTION 18
Which two elements are assets in the role of attribution in an investigation? (Choose two.)
A. context
B. session
C. laptop
D. firewall logs
E. threat actor
Answer: CD
Explanation:
The following are some factors that are used during attribution in an investigation: Assets, Threat actor, Indicators of Compromise (IoCs), Indicators of Attack
(IoAs), Chain of custody Asset: This factor identifies which assets were compromised by a threat actor or hacker. An example of an asset can be an organization's
domain controller (DC) that runs Active Directory Domain Services (AD DS). AD is a service that allows an administrator to manage user accounts, user groups,
and policies across a Microsoft Windows environment. Keep in mind that an asset is anything that has value to an organization; it can be something physical,
digital, or even people. Cisco Certified CyberOps Associate 200-201 Certification Guide
NEW QUESTION 22
Which piece of information is needed for attribution in an investigation?
Answer: C
Explanation:
Actually this is the most important thing: know who, what, how, why, etc.. attack the network.
NEW QUESTION 26
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a
competitor.
Which type of evidence is this?
A. best evidence
B. prima facie evidence
C. indirect evidence
D. physical evidence
Answer: C
Explanation:
There are three general types of evidence:
--> Best evidence: can be presented in court in the original form (for example, an exact copy of a hard disk drive).
--> Corroborating evidence: tends to support a theory or an assumption deduced by some initial evidence. This corroborating evidence confirms the proposition.
--> Indirect or circumstantial evidence: extrapolation to a conclusion of fact (such as fingerprints, DNA evidence, and so on).
NEW QUESTION 29
An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?
Answer: B
Explanation:
CDfs is a virtual file system for Unix-like operating systems; it provides access to data and audio tracks on Compact Discs. When the CDfs driver mounts a
Compact Disc, it represents each track as a file. This is consistent with the Unix convention "everything is a file". Source: https://en.wikipedia.org/wiki/CDfs
NEW QUESTION 30
Refer to the exhibit.
Which field contains DNS header information if the payload is a query or a response?
A. Z
B. ID
C. TC
D. QR
Answer: B
NEW QUESTION 35
What is the difference between inline traffic interrogation and traffic mirroring?
A. Inline interrogation is less complex as traffic mirroring applies additional tags to data.
B. Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools
C. Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.
D. Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.
Answer: A
NEW QUESTION 36
Refer to the exhibit.
Which two elements in the table are parts of the 5-tuple? (Choose two.)
A. First Packet
B. Initiator User
C. Ingress Security Zone
D. Source Port
E. Initiator IP
Answer: DE
NEW QUESTION 40
Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?
Answer: C
NEW QUESTION 45
A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does
to this type of event belong?
A. weaponization
B. delivery
C. exploitation
D. reconnaissance
Answer: B
NEW QUESTION 50
Which information must an organization use to understand the threats currently targeting the organization?
A. threat intelligence
B. risk scores
C. vendor suggestions
D. vulnerability exposure
Answer: A
NEW QUESTION 54
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?
Answer: D
NEW QUESTION 55
An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to
accomplish this task?
A. Firepower
B. Email Security Appliance
C. Web Security Appliance
D. Stealthwatch
Answer: C
NEW QUESTION 58
According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is
pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control
server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
A. malware attack
B. ransomware attack
C. whale-phishing
D. insider threat
Answer: B
NEW QUESTION 60
An engineer is investigating a case of the unauthorized usage of the “Tcpdump” tool. The analysis revealed that a malicious insider attempted to sniff traffic on a
specific interface. What type of information did the malicious insider attempt to obtain?
Answer: C
NEW QUESTION 65
Drag and drop the security concept on the left onto the example of that concept on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 66
Which step in the incident response process researches an attacking host through logs in a SIEM?
Answer: A
Explanation:
Preparation --> Detection and Analysis --> Containment, Erradicaion and Recovery --> Post-Incident Activity Detection and Analysis --> Profile networks and
systems, Understand normal behaviors, Create a log retention policy, Perform event correlation. Maintain and use a knowledge base of information.Use Internet
search engines for research. Run packet sniffers to collect additional data. Filter the data. Seek assistance from others. Keep all host clocks synchronized. Know
the different types of attacks and attack vectors. Develop processes and procedures to recognize the signs of an incident. Understand the sources of precursors
and indicators. Create appropriate incident documentation capabilities and processes. Create processes to effectively prioritize security incidents. Create
processes to effectively communicate incident information (internal and external communications).
Ref: Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
NEW QUESTION 68
What does cyber attribution identify in an investigation?
A. cause of an attack
B. exploit of an attack
C. vulnerabilities exploited
D. threat actors of an attack
Answer: D
Explanation:
https://www.techtarget.com/searchsecurity/definition/cyber-attribution
NEW QUESTION 70
Which evasion technique is a function of ransomware?
Answer: B
NEW QUESTION 71
Which process is used when IPS events are removed to improve data integrity?
A. data availability
B. data normalization
C. data signature
D. data protection
Answer: B
NEW QUESTION 75
What is rule-based detection when compared to statistical detection?
Answer: B
NEW QUESTION 77
Drag and drop the uses on the left onto the type of security system on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 81
Answer: B
NEW QUESTION 84
Which technology prevents end-device to end-device IP traceability?
A. encryption
B. load balancing
C. NAT/PAT
D. tunneling
Answer: C
NEW QUESTION 89
Which event artifact is used to identify HTTP GET requests for a specific file?
A. destination IP address
B. TCP ACK
C. HTTP status code
D. URI
Answer: D
NEW QUESTION 90
Which data type is necessary to get information about source/destination ports?
A. statistical data
B. session data
C. connectivity data
D. alert data
Answer: B
Explanation:
Session data provides information about the five tuples; source IP address/port number, destination IP address/port number and the protocol
What is Connectivity Data? According to IBM - Connectivity data defines how entities are connected in the network. It includes connections between different
devices, and VLAN-related connections within the same
device https://www.ibm.com/docs/en/networkmanager/4.2.0?topic=relationships-connectivity-data
NEW QUESTION 92
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
A. sequence numbers
B. IP identifier
C. 5-tuple
D. timestamps
Answer: C
NEW QUESTION 95
A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns
that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?
A. post-incident activity
B. detection and analysis
C. preparation
D. containment, eradication, and recovery
Answer: B
NEW QUESTION 97
Refer to the exhibit.
Answer: A
Answer: D
A. referrer
B. host
C. user-agent
D. accept-language
Answer: C
Explanation:
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20100101 Firefox/12.0 In computing, a user agent is any software, acting on behalf of a user, which
"retrieves, renders and facilitates end-user interaction with Web content".[1] A user agent is therefore a special kind of software agent.
https://en.wikipedia.org/wiki/User_agent#User_agent_identification
A user agent is a computer program representing a person, for example, a browser in a Web context. https://developer.mozilla.org/en-
US/docs/Glossary/User_agent
A. Run "ps -d" to decrease the priority state of high load processes to avoid resource exhaustion.
B. Run "ps -u" to find out who executed additional processes that caused a high load on a server.
C. Run "ps -ef" to understand which processes are taking a high amount of resources.
D. Run "ps -m" to capture the existing state of daemons and map required processes to find the gap.
Answer: C
Answer: B
A. IIS data
B. NetFlow data
C. network discovery event
D. IPS event data
Answer: B
Answer: D
Answer: A
This request was sent to a web application server driven by a database. Which type of web server attack is represented?
A. parameter manipulation
B. heap memory corruption
C. command injection
D. blind SQL injection
Answer: D
A. NetScout
B. tcpdump
C. SolarWinds
D. netsh
Answer: B
A. social engineering
B. eavesdropping
C. piggybacking
D. tailgating
Answer: A
A. A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.
B. A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself
C. A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.
D. A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit
Answer: C
A. application-level blacklisting
B. host-based IPS
C. application-level whitelisting
D. antivirus
Answer: C
Answer: B
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Table Description automatically generated
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. session duration
B. total throughput
C. running processes
D. listening ports
E. OS fingerprint
Answer: AB
Explanation:
A network profile should include some important elements, such as the following:
Total throughput – the amount of data passing from a given source to a given destination in a given period of time
Session duration – the time between the establishment of a data flow and its termination Ports used – a list of TCP or UDP processes that are available to accept
data
Critical asset address space – the IP addresses or the logical location of essential systems or data
Profiling data are data that system has gathered, these data helps for incident response and to detect incident Network profiling = throughput, sessions duration,
port used, Critical Asset Address Space Host profiling = Listening ports, logged in accounts, running processes, running tasks,applications
A. High rate of SYN packets being sent from a multiple source towards a single destination IP.
B. High rate of ACK packets being sent from a single source IP towards multiple destination IPs.
C. Flood of ACK packets coming from a single source IP to multiple destination IPs.
D. Flood of SYN packets coming from a single source IP to a single destination IP.
Answer: D
A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded
What would have occurred with stronger data visibility?
A. The traffic would have been monitored at any segment in the network.
B. Malicious traffic would have been blocked on multiple devices
C. An extra level of security would have been in place
D. Detailed information about the data in real time would have been provided
Answer: B
A. IDS
B. proxy
C. NetFlow
D. sys
Answer: A
Explanation:
You also see the 5-tuple in IPS events, NetFlow records, and other event data. In fact, on the exam you may need to differentiate between a firewall log versus a
traditional IPS or IDS event. One of the things to remember is that traditional IDS and IPS use signatures, so an easy way to differentiate is by looking for a
signature ID (SigID). If you see a signature ID, then most definitely the event is a traditional IPS or IDS event.
Answer: C
An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?
A. The file has an embedded executable and was matched by PEiD threat signatures for further analysis.
B. The file has an embedded non-Windows executable but no suspicious features are identified.
C. The file has an embedded Windows 32 executable and the Yara field lists suspicious features for further analysis.
D. The file was matched by PEiD threat signatures but no suspicious features are identified since the signature list is up to date.
Answer: C
A. examination
B. investigation
C. collection
D. reporting
Answer: C
Answer: AE
A. least privilege
B. need to know
C. separation of duties
D. due diligence
Answer: C
Answer: CD
Answer: B
A. transaction data
B. statistical data
C. session data
D. full packet capture
Answer: D
A. AWS
B. IIS
C. Load balancer
D. Proxy server
Answer: C
Explanation:
Load Balancing: HTTP(S) load balancing is one of the oldest forms of load balancing. This form of load balancing relies on layer 7, which means it operates in the
application layer. This allows routing decisions based on attributes like HTTP header, uniform resource identifier, SSL session ID, and HTML form data.
Load balancing applies to layers 4-7 in the seven-layer Open System Interconnection (OSI) model. Its capabilities are: L4. Directing traffic based on network data
and transport layer protocols, e.g., IP address and TCP port. L7. Adds content switching to load balancing, allowing routing decisions depending on characteristics
such as HTTP header, uniform resource identifier, SSL session ID, and HTML form data. GSLB. Global Server Load Balancing expands L4 and L7 capabilities to
servers in different sites
A. Base64 encoding
B. TLS encryption
C. SHA-256 hashing
D. ROT13 encryption
Answer: B
Explanation:
ROT13 is considered weak encryption and is not used with TLS (HTTPS:443). Source: https://en.wikipedia.org/wiki/ROT13
A. Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.
B. SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.
C. SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.
D. Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination
Answer: D
Answer: A
Answer: AB
Answer: D
A. alert data
B. transaction data
C. session data
D. full packet capture
Answer: D
A. ^ (?:[0-9]{1,3}\.){3}[0-9]{1,3}
B. ^ (?:[0-9]f1,3}\.){1,4}
C. ^ (?:[0-9]{1,3}\.)'
D. ^ ([0-9]-{3})
Answer: A
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Biba
B. Object-capability
C. Take-Grant
D. Zero Trust
Answer: D
Explanation:
Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network,
regardless of whether they are sitting within or outside of the network perimeter.
A. loA is the evidence that a security breach has occurred, and loC allows organizations to act before the vulnerability can be exploited.
B. loA refers to the individual responsible for the security breach, and loC refers to the resulting loss.
C. loC is the evidence that a security breach has occurred, and loA allows organizations to act before the vulnerability can be exploited.
D. loC refers to the individual responsible for the security breach, and loA refers to the resulting loss.
Answer: C
A. phishing email
B. sender
C. HR
D. receiver
Answer: B
A. NetFlow
B. IDS
C. web proxy
D. firewall
Answer: D
A. port scan
B. SYN flood
C. man-in-the-middle
D. phishing
E. teardrop
Answer: BC
What does the output indicate about the server with the IP address 172.18.104.139?
Answer: C
A. SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.
B. SlEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.
C. SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.
D. SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.
Answer: B
100% Pass Your 200-201 Exam with Our Prep Materials Via below:
https://www.certleader.com/200-201-dumps.html