Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

200-201 Exam Dumps - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Go to page:
Question # 73

An engineer must configure network systems to detect command-and-control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology must be used to accomplish this task?

A.

static IP addresses

B.

signatures

C.

digital certificates

D.

cipher suite

Full Access
Question # 74

Which action matches the weaponization step of the Cyber Kill Chain Model?

A.

Develop a specific malware to exploit a vulnerable server, i

B.

Match a known script to a vulnerability.

C.

Construct a trojan and deliver l! to the victim.

D.

Scan open services and ports on a server.

Full Access
Question # 75

What is a difference between a threat and a risk?

A.

A threat is a sum of risks and a risk itself represents a specific danger toward the asset

B.

A threat can be people property, or information, and risk is a probability by which these threats may bring harm to the business

C.

A risk is a flaw or hole in security, and a threat is what is being used against that flaw

D.

A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against

Full Access
Question # 76

An engineer is investigating a case of the unauthorized usage of the “Tcpdump” tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

A.

tagged protocols being used on the network

B.

all firewall alerts and resulting mitigations

C.

tagged ports being used on the network

D.

all information and data within the datagram

Full Access
Question # 77

What is the difference between the rule-based detection when compared to behavioral detection?

A.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

B.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

C.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

D.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Full Access
Question # 78

Refer to the exhibit.

Which attack is being attempted against a web application?

A.

SQL injection

B.

man-in-the-middle

C.

command injection

D.

denial of service

Full Access
Question # 79

What is a difference between SOAR and SIEM?

A.

SOAR platforms are used for threat and vulnerability management, but SIEM applications are not

B.

SIEM applications are used for threat and vulnerability management, but SOAR platforms are not

C.

SOAR receives information from a single platform and delivers it to a SIEM

D.

SIEM receives information from a single platform and delivers it to a SOAR

Full Access
Question # 80

Drag and drop the event term from the left onto the description on the right.

Full Access
Go to page: