Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

200-201 Exam Questions Tutorials

Page: 15 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 57

What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?

Options:

A.

central key management server

B.

web of trust

C.

trusted certificate authorities

D.

registration authority data

Question 58

How does statistical detection differ from rule-based detection?

Options:

A.

Statistical detection involves the evaluation of events, and rule-based detection requires an evaluated set of events to function.

B.

Statistical detection defines legitimate data over time, and rule-based detection works on a predefined set of rules

C.

Rule-based detection involves the evaluation of events, and statistical detection requires an evaluated set of events to function Rule-based detection defines

D.

legitimate data over a period of time, and statistical detection works on a predefined set of rules

Question 59

Refer to the exhibit.

Which technology generates this log?

Options:

A.

NetFlow

B.

IDS

C.

web proxy

D.

firewall

Question 60

What is a disadvantage of the asymmetric encryption system?

Options:

A.

It is slow compared to the symmetric encryption system.

B.

Asymmetric encryption is used to transfer the data, and symmetric is used to encrypt small chunks of data.

C.

Asymmetric encryption is an old technique, and symmetric encryption is the newer one.

D.

It is less secure because it uses a single key for encryption.

Page: 15 / 36
Total 476 questions