What is the difference between statistical detection and rule-based detection models?
Answer(s): B
What is the difference between a threat and a risk?
Answer(s): A
A threat is any potential danger to an asset. If a vulnerability exists but has not yet been exploited-- or, more importantly, it is not yet publicly known--the threat is latent and not yet realized.
Which attack method intercepts traffic on a switched network?
An ARP-based MITM attack is achieved when an attacker poisons the ARP cache of two devices with the MAC address of the attacker's network interface card (NIC). Once the ARP caches have been successfully poisoned, each victim device sends all its packets to the attacker when communicating to the other device and puts the attacker in the middle of the communications path between the two victim devices. It allows an attacker to easily monitor all communication between victim devices. The intent is to intercept and view the information being passed between the two victim devices and potentially introduce sessions and traffic between the two victim devices
What does an attacker use to determine which network ports are listening on a potential target device?
Post your Comments and Discuss Cisco® 200-201 exam with other Community members:
AEB commented on December 11, 2024 The breadth of knowledge for this exam is large. It doesn't seem possible to learn everything on it for an associate level exam. UNITED STATES upvote
Bio commented on September 05, 2023 200-201 CBROPS 092023 - Exam still 75% to 80% valid. Suggest to those who wants to pass to study this, along with netacads, and review quizlets to ensure you pass. GERMANY upvote
AB commented on August 21, 2023 200-201 is still good. passed Aug 14 UNITED STATES upvote