Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

200-201 Reviews Questions

Page: 34 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 133

A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?

Options:

A.

DNS hijacking

B.

DNS tunneling

C.

DNS flooding

D.

DNS amplification

Question 134

Refer to exhibit.

An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?

Options:

A.

data encapsulation

B.

IP fragmentation

C.

code obfuscation

D.

data encryption

Question 135

What is a description of a social engineering attack?

Options:

A.

fake offer for free music download to trick the user into providing sensitive data

B.

package deliberately sent to the wrong receiver to advertise a new product

C.

mistakenly received valuable order destined for another person and hidden on purpose

D.

email offering last-minute deals on various vacations around the world with a due date and a counter

Question 136

What is the role of indicator of compromise in an investigation?

Options:

A.

It helps answer the question of why the attack took place.

B.

It identifies potentially malicious activity on a system or network.

C.

It is nonforensic data, which is easy to detect.

D.

It describes what and why something happened.

Page: 34 / 36
Total 476 questions