Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Full Version 200-201 Cisco Exam

Page: 30 / 36
Total 476 questions

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers

Question 117

Refer to exhibit.

An engineer is Investigating an Intrusion and Is analyzing the pcap file. Which two key elements must an engineer consider? (Choose two.)

Options:

A.

Variable "info" field and unchanging sequence number

B.

High volume oi SYN packets with very little variance in lime

C.

identical length of 120 and window size (64)

D.

SYN packets acknowledged from several source IP addresses

E.

same source IP address with a destination port 80

Question 118

What is a scareware attack?

Options:

A.

using the spoofed email addresses to trick people into providing login credentials

B.

overwhelming a targeted website with fake traffic

C.

gaming access to your computer and encrypting data stored on it

D.

inserting malicious code that causes popup windows with flashing colors

Question 119

What is the difference between the ACK flag and the RST flag?

Options:

A.

The ACK flag validates the receipt of the previous packet in the stream, and the same session is being closed by the RST flag.

B.

The ACK flag validates the next packets to be sent to a destination, and the RST flag is what the RST returns to indicate that the destination is reachable.

C.

The RST flag identifies the connection as reliable and trustworthy within the handshake process, and the ACK flag prepares a response by opening a session between the source and destination.

D.

The RST flag establishes the communication, and the ACK flag cancels spontaneous connections that were not specifically sent to the expecting host.

Question 120

Refer to the exhibit.

An attacker Infiltrated an organization's network and ran a scan to advance with the lateral movement technique. Which two elements from the scan assist the attacker? (Choose two.)

Options:

A.

function and service the server is providing

B.

CPU and vendor version of the asset

C.

running services and parts

D.

security identifiers of logged-in accounts

E.

latency and MS information to calculate delays for a command injection

Page: 30 / 36
Total 476 questions