exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 68 discussion

Actual exam question from Cisco's 200-201
Question #: 68
Topic #: 1
[All 200-201 Questions]

What are the two characteristics of the full packet captures? (Choose two.)

  • A. Identifying network loops and collision domains.
  • B. Troubleshooting the cause of security and performance issues.
  • C. Reassembling fragmented traffic from raw data.
  • D. Detecting common hardware faults and identify faulty assets.
  • E. Providing a historical record of a network transaction.
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
evra
Highly Voted 4 years ago
It is BE
upvoted 12 times
harshi
3 years, 10 months ago
why not C ? P Reassembly is a feature in Wireshark and TShark to automatically reassemble all fragmented IP Datagrams into a full IP packet before ... This feature will require a lot of extra memory to be consumed by wireshark in order to store the ... You have captured packets with a SnapLen less than the MTU of the ...
upvoted 1 times
...
...
3000bd6
Most Recent 5 months, 4 weeks ago
Selected Answer: BE
B and E is the better answer
upvoted 2 times
...
d503c75
8 months ago
BE is the correct answer. About B: Packet capture enables teams to deal with complex network issues with ease and efficiency. - https://www.solarwinds.com/resources/it-glossary/pcap
upvoted 1 times
...
RoBery
1 year, 4 months ago
BD Not only are network protocol analyzers used for security analysis. They are also very useful for network troubleshooting, software and protocol development, and education. For instance, in security forensics, a security analyst may attempt to reconstruct an incident from relevant packet captures.
upvoted 1 times
...
sheyshey
1 year, 5 months ago
Selected Answer: BE
B and E for me
upvoted 1 times
...
toirdem
1 year, 8 months ago
Selected Answer: BE
agree it is BE
upvoted 1 times
...
Topsecret
1 year, 10 months ago
The two characteristics of full packet captures are: B. Troubleshooting the cause of security and performance issues. E. Providing a historical record of a network transaction. Options A, C, and D are not characteristics of full packet captures
upvoted 1 times
...
drdecker100
2 years, 2 months ago
Selected Answer: BE
Option C is not necessarily wrong, but it is not one of the two characteristics of full packet captures that the question is asking for. Reassembling fragmented traffic from raw data is a capability of full packet capture and can be useful for analyzing and understanding network traffic. However, the question is specifically asking for the two main characteristics of full packet capture.
upvoted 3 times
...
SecurityGuy
2 years, 3 months ago
Selected Answer: CE
Let's start from the word itself. "Characterstics" Characteristics - a feature or quality belonging typically to a person, place, or thing and serving to identify it. >>Characteristics<< - Reassembling fragmented traffic from raw data. - Providing a historical record of a Network Transaction. >>Use cases or Diagnostics<< - Identifying network loops and Collision Domains. - Troubleshooting the cause of security and performance issues. - Detecting common hardware faults and identify faulty assets.
upvoted 3 times
...
cy_analyst
2 years, 6 months ago
Selected Answer: CE
Clearly bc we are here for cybersecurity, the other answers can be for net engineers.
upvoted 2 times
SecurityGuy
2 years, 3 months ago
Yes, that makes sense. We should be thinking as Security / SOC Engineers and not as a Network Engineer.
upvoted 1 times
...
...
cy_analyst
2 years, 7 months ago
Selected Answer: BE
BE for right answer.
upvoted 1 times
cy_analyst
2 years, 6 months ago
not the right choice. If can please delete the comment.
upvoted 1 times
theodorrrr
2 years, 6 months ago
So C E is the correct?
upvoted 1 times
...
...
...
Eng_ahmedyoussef
2 years, 7 months ago
Selected Answer: CE
C & E seems to be the correct answer .
upvoted 1 times
...
evra
3 years ago
It is BE. The question is about full packet capture and not about packet analysers. "Full Packet Capture (FPC) provides a network defender an after-the-fact investigative capability that other security tools cannot provide. Uses include capturing malware samples, network exploits and determining if data exfiltration has occurred. Full packet captures are a valuable troubleshooting tool for operations and security teams alike." https://sansorg.egnyte.com/dl/v6XafdW96e
upvoted 1 times
...
halamah
3 years, 6 months ago
correct it can ressamble the data that in the same session
upvoted 2 times
...
alocin
3 years, 7 months ago
C and E seem me correct answers. I don't exclude B because for Troubleshooting often use Wireshark. ops .. but this is third.
upvoted 1 times
...
[Removed]
3 years, 7 months ago
I agreee with anonymous1966. I think that correct answer is CE. C. Reassembling fragmented traffic from raw data. There is reassembly feature in Wireshark. https://wiki.wireshark.org/IP_Reassembly# E. Providing a historical record of a network transaction. Packet captures provide a full historical record of a network transaction or an attack. It is important to recognize that no other data source offers this level of detail. From Book:Omar Santos - Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
upvoted 1 times
...
anonymous1966
3 years, 8 months ago
"C" is correct. IP Reassembly IP Reassembly is a feature in Wireshark and TShark to automatically reassemble all fragmented IP Datagrams into a full IP packet before calling the higher layer dissector. Ref: https://wiki.wireshark.org/IP_Reassembly This feature will require a lot of extra memory to be consumed by wireshark in order to store the reassembly buffers and is disabled by default. "E" is correct. By the book: Packet captures provide a full historical record of a network transaction or an attack. It is important to recognize that no other data source offers this level of detail. There are many study of cases of using Wireshark to troubleshooting the cause of security and performance issues. So, "B" would also be right. But the other options are more direct.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago