00:00

QUESTION 21

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?

Correct Answer: A

QUESTION 22

Which artifact is used to uniquely identify a detected file?

Correct Answer: D

QUESTION 23

Refer to the exhibit.
200-201 dumps exhibit
What does the message indicate?

Correct Answer: C

QUESTION 24

A malicious file has been identified in a sandbox analysis tool.
200-201 dumps exhibit
Which piece of information is needed to search for additional downloads of this file by other hosts?

Correct Answer: D

QUESTION 25

Which step in the incident response process researches an attacking host through logs in a SIEM?

Correct Answer: A
Preparation --> Detection and Analysis --> Containment, Erradicaion and Recovery --> Post-Incident Activity Detection and Analysis --> Profile networks and systems, Understand normal behaviors, Create a log retention policy, Perform event correlation. Maintain and use a knowledge base of information.Use Internet search engines for research. Run packet sniffers to collect additional data. Filter the data. Seek assistance from others. Keep all host clocks synchronized. Know the different types of attacks and attack vectors. Develop processes and procedures to recognize the signs of an incident. Understand the sources of precursors and indicators. Create appropriate incident documentation capabilities and processes. Create processes to effectively prioritize security incidents. Create processes to effectively communicate incident information (internal and external communications).
Ref: Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide