Free 200-201 Exam Braindumps (page: 29)

Page 28 of 66

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?

  1. resource exhaustion
  2. tunneling
  3. traffic fragmentation
  4. timing attack

Answer(s): A

Explanation:

Resource exhaustion is a type of denial-of-service attack; however, it can also be used to evade detection by security defenses. A simple definition of resource exhaustion is "consuming the resources necessary to perform an action." Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide



Refer to the exhibit.



Which application protocol is in this PCAP file?

  1. SSH
  2. TCP
  3. TLS
  4. HTTP

Answer(s): D



DRAG DROP (Drag and Drop is not supported)

Refer to the exhibit.



Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Refer to the exhibit.



What is the expected result when the "Allow subdissector to reassemble TCP streams" feature is enabled?

  1. insert TCP subdissectors
  2. extract a file from a packet capture
  3. disable TCP streams
  4. unfragment TCP

Answer(s): D






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

200-201 Discussions & Posts