200-201試験無料問題集「Cisco Understanding Cisco Cybersecurity Operations Fundamentals 認定」

A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?

解説: (GoShiken メンバーにのみ表示されます)
How is NetFlow different from traffic mirroring?

解説: (GoShiken メンバーにのみ表示されます)
Which security monitoring data type requires the largest storage space?

解説: (GoShiken メンバーにのみ表示されます)
Which regular expression matches "color" and "colour"?

解説: (GoShiken メンバーにのみ表示されます)
What is a benefit of using asymmetric cryptography?

解説: (GoShiken メンバーにのみ表示されます)
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?

解説: (GoShiken メンバーにのみ表示されます)
According to CVSS, what is a description of the attack vector score?

解説: (GoShiken メンバーにのみ表示されます)
Exhibit.

An engineer received a ticket about a slowdown of a web application, Drug analysis of traffic, the engineer suspects a possible attack on a web server. How should the engineer interpret the Wiresharat traffic capture?

解説: (GoShiken メンバーにのみ表示されます)
Which action prevents buffer overflow attacks?

解説: (GoShiken メンバーにのみ表示されます)
A SOC analyst detected connections to known C&C and port scanning activity to main HR database servers from one of the HR endpoints via Cisco StealthWatch. What are the two next steps of the SOC team according to the NISTSP800-61 incident handling process? (Choose two)

解説: (GoShiken メンバーにのみ表示されます)
How does statistical detection differ from rule-based detection?

解説: (GoShiken メンバーにのみ表示されます)
Refer to the exhibit.

What does this Cuckoo sandbox report indicate?

解説: (GoShiken メンバーにのみ表示されます)
Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
正解:
An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN. What is causing this issue?

解説: (GoShiken メンバーにのみ表示されます)
What does an attacker use to determine which network ports are listening on a potential target device?

解説: (GoShiken メンバーにのみ表示されます)
What is an attack surface as compared to a vulnerability?

解説: (GoShiken メンバーにのみ表示されます)
Which attack represents the evasion technique of resource exhaustion?

解説: (GoShiken メンバーにのみ表示されます)
Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)

解説: (GoShiken メンバーにのみ表示されます)