exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 61 discussion

Actual exam question from Cisco's 200-201
Question #: 61
Topic #: 1
[All 200-201 Questions]

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
What is the impact of this traffic?

  • A. ransomware communicating after infection
  • B. users downloading copyrighted content
  • C. data exfiltration
  • D. user circumvention of the firewall
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
anonymous1966
Highly Voted 2 years, 1 month ago
Correct answer = D A Tor exit node is basically the last Tor node or the gateway where the Tor encrypted traffic exits to the Internet. A Tor exit node can be targeted to monitor Tor traffic. Many organizations block Tor exit nodes in their environment. The Tor project has a dynamic list of Tor exit nodes that makes this task a bit easier. This Tor exit node list can be downloaded from https://check.torproject.org/exit-addresses.
upvoted 12 times
...
drdecker100
Most Recent 8 months, 3 weeks ago
Selected Answer: D
The TOR (The Onion Router) network is often used to anonymize traffic on the internet, which can be beneficial for protecting privacy, but it can also be used to circumvent network security measures, such as firewalls. When traffic with a known TOR exit node occurs on a network, it means that a user is likely attempting to use TOR to bypass network restrictions and access restricted content or services. Ransomware communicating after infection, users downloading copyrighted content, and data exfiltration are all potential security threats that could occur on a network, but they are not directly related to traffic with a known TOR exit node.
upvoted 1 times
...
SecurityGuy
9 months, 1 week ago
Selected Answer: D
TOR (The Onion Router) It is an open-source privacy network that enables anonymous web browsing. The Tor browser enables people to have access to the dark web. TOR Exit Node Tor moves encrypted traffic across a network of Tor servers and provides anonymity to users. A Tor exit node is the final node that routes Tor traffic to a destination. Circumvention The process of avoiding something, especially cleverly or illegally. Circumvention Tools They are designed to bypass online censorship such as simple web proxies, virtual private network service, and so on. Frequently used in countries whose governments impose heavy Internet censorship.
upvoted 2 times
...
Binx
9 months, 2 weeks ago
The question is What is the Impact? NIST states "The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability." To me the biggest IMPACT here from TOR traffic is , Data Exfiltration. As an analyst, I would be more concerned with untraceable traffic like TOR, stealing data. I say Data Exfiltration.
upvoted 2 times
Binx
9 months, 2 weeks ago
NIST states "Impact" as The magnitude of harm.... we need an edit tab with this post system.
upvoted 1 times
...
...
trigger4848
1 year ago
Selected Answer: D
I think D. Bc if the if the TOR exit node "is known" the only way there should be rules/firewalls in place to make sure that traffic never enters or is even allowed out of the network, so if its on the network D makes sense
upvoted 1 times
...
cy_analyst
1 year, 1 month ago
Selected Answer: C
I will use TOR exit to exfiltrate data from the network bypassing the firewall and the company rules.
upvoted 1 times
...
halamah
1 year, 11 months ago
d is correct tor unknown the identity of the browser ip
upvoted 1 times
...
[Removed]
2 years, 1 month ago
It looks like that user used TOR browser to download content. So it seems that the correct answer is: B. users downloading copyrighted content
upvoted 1 times
...
skysoft
2 years, 10 months ago
This is a strange question. Detecting the address of a tor EXITnode means someone is using TOR to initiate communication with your network (server probably). When a user IN the network is connecting via TOR to circumvent the firewall, he is connecting to a "guard" node. (aka entry node). Answer D is not the correct answer. For the same reason "B" is not correct either. because of the inbound nature of the traffic, A or C are possible but should be blocked by the firewall. I don't know the aswer, anyone ?
upvoted 2 times
tsabee
2 years ago
Funny... Actually every answer is correct from different aspect... Only the C answer may be the weakest, beacuse the traffice come from TOR Exit node - so the traffic towards to firewall, it is received traffic, and the data exfiltration is rather than an upload traffic. I'm hesitateing between B and D, but the D is more "official" than the B. The B is only a type of using to TOR, not a definition. I know it isn't so convincing argument, but may be this is the reason why I choose D. Of course a firewall can block it, but as you know it is only a possibility. :)
upvoted 1 times
...
hoek
2 years, 10 months ago
You probably answered yourself :) "A or C are possible but should be blocked by the firewall." So firewall is not blocking the connection from TOR.
upvoted 1 times
...
Aimismyname
2 years, 5 months ago
A user circumventing firewalls may connect to a guard node, but I think the data response will be considered to come from an exit node. I feel this is the answer. Ransomware communicating from host to server would connect to guard node as you say. Same for data exfiltrating to a server on TOR. I would say downloading copyrighted data is not strictly an "impact".
upvoted 1 times
...
bren_
2 years, 10 months ago
imho D is the only valid answer here. to use a TOR exit node could implicitly mean you're somehow finding a way around a firewall.
upvoted 12 times
anonymous1966
2 years, 2 months ago
Agreed
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago