Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CyberOps Associate 200-201 Reddit Questions

Page: 11 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 41

An organization recently experienced a major incident in which servers were attacked and data integrity was compromised. The attacker exploited a vulnerability in TLS 1.2 and performed a man-in-the-middle attack by downgrading the connection. Which action should a security specialist take to prevent similar attacks in the future?

Options:

A.

Upgrade to TLS 1.3 or a higher version

B.

Deploy a network monitoring solution

C.

Update IIS server versions

D.

Install a lower version of TLS such as 1.1

Question 42

What is the difference between an attack vector and an attack surface?

Options:

A.

Attack vectors are flaws in configuration, and the attack surface is the system or software that has such flaws.

B.

The attack vector targets security weaknesses, and the attack surface is where an adversary attempts to gain entry across those weaknesses.

C.

The attack surface is tactics, techniques, and procedures used by the threat actor, and the attack vector is the system hardware.

D.

The attack surface defines the number of existing vulnerabilities available, and the attack vector determines the difficulty of available exploits.

Question 43

How does TOR alter data content during transit?

Options:

A.

It spoofs the destination and source information protecting both sides.

B.

It encrypts content and destination information over multiple layers.

C.

It redirects destination traffic through multiple sources avoiding traceability.

D.

It traverses source traffic through multiple destinations before reaching the receiver

Question 44

Which action matches the weaponization step of the Cyber Kill Chain model?

Options:

A.

Scan a host to find open ports and vulnerabilities

B.

Construct the appropriate malware and deliver it to the victim.

C.

Test and construct the appropriate malware to launch the attack

D.

Research data on a specific vulnerability

Page: 11 / 36
Total 476 questions