Free 200-201 Exam Braindumps

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?

  1. fragmentation
  2. pivoting
  3. encryption
  4. stenography

Answer(s): C

Explanation:

https://techdifferences.com/difference-between-steganography-and- cryptography.html#:~:text=The%20steganography%20and%20cryptography%20are,the%20structure %20of%20the%20message.



Why is encryption challenging to security monitoring?

  1. Encryption analysis is used by attackers to monitor VPN tunnels.
  2. Encryption is used by threat actors as a method of evasion and obfuscation.
  3. Encryption introduces additional processing requirements by the CPU.
  4. Encryption introduces larger packet sizes to analyze and store.

Answer(s): B



An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts.
What is causing the lack of data visibility needed to detect the attack?

  1. The threat actor used a dictionary-based password attack to obtain credentials.
  2. The threat actor gained access to the system by known credentials.
  3. The threat actor used the teardrop technique to confuse and crash login services.
  4. The threat actor used an unknown vulnerability of the operating system that went undetected.

Answer(s): C



A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information.
What is the threat actor in this incident?

  1. company assets that are threatened
  2. customer assets that are threatened
  3. perpetrators of the attack
  4. victims of the attack

Answer(s): B






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

AEB commented on December 11, 2024
The breadth of knowledge for this exam is large. It doesn't seem possible to learn everything on it for an associate level exam.
UNITED STATES
upvote

Bio commented on September 05, 2023
200-201 CBROPS 092023 - Exam still 75% to 80% valid. Suggest to those who wants to pass to study this, along with netacads, and review quizlets to ensure you pass.
GERMANY
upvote

AB commented on August 21, 2023
200-201 is still good. passed Aug 14
UNITED STATES
upvote