What are two denial of service attacks? (Choose two.)
Answer(s): C,D
An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
Answer(s): B
https://explainshell.com/explain?cmd=nmap+-sP
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.Which obfuscation technique is the attacker using?
ROT13 is considered weak encryption and is not used with TLS (HTTPS:443).
https://en.wikipedia.org/wiki/ROT13
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Answer(s): A,E
Cert Guide by Omar Santos, Chapter 9 - Introduction to digital Forensics. "When you collect evidence, you must protect its integrity. This involves making sure that nothing is added to the evidence and that nothing is deleted or destroyed (this is known as evidence preservation)."
Post your Comments and Discuss Cisco® 200-201 exam with other Community members:
AEB commented on December 11, 2024 The breadth of knowledge for this exam is large. It doesn't seem possible to learn everything on it for an associate level exam. UNITED STATES upvote
Bio commented on September 05, 2023 200-201 CBROPS 092023 - Exam still 75% to 80% valid. Suggest to those who wants to pass to study this, along with netacads, and review quizlets to ensure you pass. GERMANY upvote
AB commented on August 21, 2023 200-201 is still good. passed Aug 14 UNITED STATES upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 200-201 content, but please register or login to continue.