Cisco 200-201 Understanding Cisco Cybersecurity Operations Fundamentals CBROPS Exam Practice Test

Page: 1 / 14
Total 263 questions
Question 1

What describes a buffer overflow attack?



Answer : C

Question 2

What is a description of a social engineering attack?



Answer : D

Question 3

Which tool gives the ability to see session data in real time?



Answer : C

Question 4

What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?



Answer : C

Question 5

What is the difference between deep packet inspection and stateful inspection?



Answer : D

Question 6

A security engineer notices confidential data being exfiltrated to a domain "Ranso4134-mware31-895" address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?



Answer : D

Question 7

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?



Answer : A

Page:    1 / 14   
Total 263 questions