Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your 200-201 CyberOps Associate Exam

Page: 19 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 73

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

Options:

A.

X.509 certificates

B.

RADIUS server

C.

CA server

D.

web application firewall

Question 74

A company had a recent breach and lost confidential data to a competitor. An internal investigation found out that a new junior accounting specialist logged in to the accounting server with their user ID and stole confidential data. The junior accounting specialist denies the action and claims that the attempt was done by someone else. During court proceedings, the company presents logs and CCTV camera recordings that show the malicious insider in action. Which type of evidence has the company presented?

Options:

A.

indirect and corroborative

B.

direct and corroborative

C.

circumstantial and direct

D.

corroborative and substantive

Question 75

What is the difference between authentication and authorization?

Options:

A.

Authorization is used by a server when the server needs to know exactly who is accessing resources, and authentication is a process by which a server determines the permissions.

B.

Authorization allows an engineer to control the user access level privileges to the router, and authentication is the process of giving the user-specific permissions.

C.

Authentication is coupled with authorization so that the server knows who the requestor is, and authorization is used by a requestor that knows the server.

D.

Authentication allows an engineer to identify who can connect to a router, and authorization is the function of specifying access rights and privileges to resources.

Question 76

What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?

Options:

A.

MAC is controlled by the discretion of the owner and DAC is controlled by an administrator

B.

MAC is the strictest of all levels of control and DAC is object-based access

C.

DAC is controlled by the operating system and MAC is controlled by an administrator

D.

DAC is the strictest of all levels of control and MAC is object-based access

Page: 19 / 36
Total 476 questions