200-201 Dumps

200-201 Free Practice Test

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals

QUESTION 31

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

Correct Answer: C
Load Balancing: HTTP(S) load balancing is one of the oldest forms of load balancing. This form of load balancing relies on layer 7, which means it operates in the application layer. This allows routing decisions based on attributes like HTTP header, uniform resource identifier, SSL session ID, and HTML form data.
Load balancing applies to layers 4-7 in the seven-layer Open System Interconnection (OSI) model. Its capabilities are: L4. Directing traffic based on network data and transport layer protocols, e.g., IP address and TCP port. L7. Adds content switching to load balancing, allowing routing decisions depending on characteristics such as HTTP header, uniform resource identifier, SSL session ID, and HTML form data. GSLB. Global Server Load Balancing expands L4 and L7 capabilities to servers in different sites

QUESTION 32

How is NetFlow different from traffic mirroring?

Correct Answer: A

QUESTION 33

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
200-201 dumps exhibit
Solution:
Exploitation - The targeted Environment is taken advantage of triggering the threat actor's code Installation - Backdoor is placed on the victim system allowing the threat actor to maintain the persistence. Command and Control - An outbound connection is established to an Internet-based controller server. Actions and Objectives - The threat actor takes actions to violate data integrity and availability

Does this meet the goal?

Correct Answer: A

QUESTION 34

Which utility blocks a host portscan?

Correct Answer: C

QUESTION 35

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
200-201 dumps exhibit
Solution:
Delivery: This step involves transmitting the weapon to the target.
Weaponization: In this step, the intruder creates a malware weapon like a virus, worm or such in order to exploit the vulnerabilities of the target. Depending on the target and the purpose of the attacker, this malware can exploit new, undetected vulnerabilities (also known as the zero-day exploits) or it can focus on a combination of different vulnerabilities.
Reconnaissance: In this step, the attacker / intruder chooses their target. Then they conduct an in-depth research on this target to identify its vulnerabilities that can be exploited.

Does this meet the goal?

Correct Answer: A