200-201 Dumps

200-201 Free Practice Test

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals

QUESTION 101

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
200-201 dumps exhibit
Solution:
Exploitation - The targeted Environment is taken advantage of triggering the threat actor's code Installation - Backdoor is placed on the victim system allowing the threat actor to maintain the persistence. Command and Control - An outbound connection is established to an Internet-based controller server. Actions and Objectives - The threat actor takes actions to violate data integrity and availability

Does this meet the goal?

Correct Answer: A

QUESTION 102

Which utility blocks a host portscan?

Correct Answer: C

QUESTION 103

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
200-201 dumps exhibit
Solution:
Delivery: This step involves transmitting the weapon to the target.
Weaponization: In this step, the intruder creates a malware weapon like a virus, worm or such in order to exploit the vulnerabilities of the target. Depending on the target and the purpose of the attacker, this malware can exploit new, undetected vulnerabilities (also known as the zero-day exploits) or it can focus on a combination of different vulnerabilities.
Reconnaissance: In this step, the attacker / intruder chooses their target. Then they conduct an in-depth research on this target to identify its vulnerabilities that can be exploited.

Does this meet the goal?

Correct Answer: A

QUESTION 104

What is a benefit of using asymmetric cryptography?

Correct Answer: C

QUESTION 105

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

Correct Answer: A