What is the difference between statistical detection and rule-based detection models?
Answer(s): B
What is the difference between a threat and a risk?
Answer(s): A
A threat is any potential danger to an asset. If a vulnerability exists but has not yet been exploited-- or, more importantly, it is not yet publicly known--the threat is latent and not yet realized.
Which attack method intercepts traffic on a switched network?
An ARP-based MITM attack is achieved when an attacker poisons the ARP cache of two devices with the MAC address of the attacker's network interface card (NIC). Once the ARP caches have been successfully poisoned, each victim device sends all its packets to the attacker when communicating to the other device and puts the attacker in the middle of the communications path between the two victim devices. It allows an attacker to easily monitor all communication between victim devices. The intent is to intercept and view the information being passed between the two victim devices and potentially introduce sessions and traffic between the two victim devices
What does an attacker use to determine which network ports are listening on a potential target device?
Post your Comments and Discuss Cisco® 200-201 exam with other Community members:
None-ya Commented on March 06, 2025 Just here for the practice. UNITED STATES
AEB Commented on January 30, 2025 The breadth of knowledge for this exam is large. It doesn't seem possible to learn everything on it for an associate level exam. UNITED STATES
Bio Commented on September 05, 2023 200-201 CBROPS 092023 - Exam still 75% to 80% valid. Suggest to those who wants to pass to study this, along with netacads, and review quizlets to ensure you pass. GERMANY
AB Commented on August 21, 2023 200-201 is still good. passed Aug 14 UNITED STATES