Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

200-201 Leak Questions

Page: 22 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 85

What is the purpose of a ransomware attack?

Options:

A.

to make files inaccessible by encrypting the data

B.

to decrypt encrypted data and disks

C.

to send keystrokes to a threat actor

D.

to escalate privileges

Question 86

Refer to the exhibit.

Which component is identifiable in this exhibit?

Options:

A.

Trusted Root Certificate store on the local machine

B.

Windows PowerShell verb

C.

Windows Registry hive

D.

local service in the Windows Services Manager

Question 87

Which type of evasion technique is accomplished by separating the traffic into smaller segments before transmitting across the network?

Options:

A.

tunneling

B.

fragmentation

C.

encryption

D.

proxies

Question 88

Syslog collecting software is installed on the server For the log containment, a disk with FAT type partition is used An engineer determined that log files are being corrupted when the 4 GB tile size is exceeded. Which action resolves the issue?

Options:

A.

Add space to the existing partition and lower the retention period.

B.

Use FAT32 to exceed the limit of 4 GB.

C.

Use the Ext4 partition because it can hold files up to 16 TB.

D.

Use NTFS partition for log file containment

Page: 22 / 36
Total 476 questions