200-201試験無料問題集「Cisco Understanding Cisco Cybersecurity Operations Fundamentals 認定」

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

解説: (GoShiken メンバーにのみ表示されます)
What is a benefit of using asymmetric cryptography?

解説: (GoShiken メンバーにのみ表示されます)
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?

解説: (GoShiken メンバーにのみ表示されます)

Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.
正解:
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?

Why should an engineer use a full packet capture to investigate a security breach?

解説: (GoShiken メンバーにのみ表示されます)
What is the virtual address space for a Windows process?

解説: (GoShiken メンバーにのみ表示されます)
How can TOR impact data visibility inside an organization?

解説: (GoShiken メンバーにのみ表示されます)
An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?

解説: (GoShiken メンバーにのみ表示されます)
Refer to the exhibit.
What is the expected result when the "Allow subdissector to reassemble TCP streams" feature is enabled?

解説: (GoShiken メンバーにのみ表示されます)
What is a collection of compromised machines that attackers use to carry out a DDoS attack?

解説: (GoShiken メンバーにのみ表示されます)
After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?

解説: (GoShiken メンバーにのみ表示されます)
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?

解説: (GoShiken メンバーにのみ表示されます)
Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?

解説: (GoShiken メンバーにのみ表示されます)