exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 108 discussion

Actual exam question from Cisco's 200-201
Question #: 108
Topic #: 1
[All 200-201 Questions]

Which step in the incident response process researches an attacking host through logs in a SIEM?

  • A. detection and analysis
  • B. preparation
  • C. eradication
  • D. containment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
drdecker100
Highly Voted 9 months, 3 weeks ago
Selected Answer: A
The incident response process typically includes the following phases: preparation, detection and analysis, containment, eradication, and recovery. The detection and analysis phase is focused on identifying and assessing the scope and severity of the incident, and this includes analyzing logs and other data to identify the source and nature of the attack.
upvoted 8 times
...
hansamaru
Most Recent 1 year ago
Selected Answer: A
Supposed to be A
upvoted 1 times
...
MaliDong
1 year, 1 month ago
Selected Answer: D
D should be the answer.
upvoted 2 times
...
trigger4848
1 year, 1 month ago
Selected Answer: A
these questions are tricky but the key here " researches an attacking host through logs in a SIEM?" -- This should be done in Detection and Analysis -- A
upvoted 3 times
...
Eng_ahmedyoussef
1 year, 2 months ago
Selected Answer: A
A is correct answer. Preparation --> Detection and Analysis --> Containment, Eradication and Recovery --> Post-Incident Activity
upvoted 2 times
...
[Removed]
1 year, 4 months ago
sorry NIST SP 800-61...
upvoted 1 times
...
[Removed]
1 year, 4 months ago
According to NIST SP 800-31 3.3 Identifying the Attacking Hosts - incident handlers should generally stay focused on containment, eradication, and recovery. Could be C and D
upvoted 1 times
...
adodoccletus
1 year, 5 months ago
Identifying the attacking host is done during containment so the correct answer is "D"
upvoted 1 times
...
Dunky
1 year, 8 months ago
It is done during Containment, eradication and recovery which is considered a single phase. As per the course guide "Containment, Eradication, and Recovery The containment, eradication, and recovery phase includes the following activities: ■ Gathering and handling evidence ■ Identifying the attacking hosts ■ Choosing a containment strategy to effectively contain and eradicate the attack, as well as to successfully recover from it"
upvoted 2 times
...
archbbo
1 year, 8 months ago
page 303 in cyberops book, states Containment, eridacation and recovery, - identify the attacking host,,, which is bad wording because that means answer could be containment or eradication since they are both possible answers. horrible test writing for cisco here .
upvoted 2 times
...
bn1234
1 year, 8 months ago
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf section 3.3.3 shows "Identifiing the Attacking Hosts" under "Containment, Eradication, and Recovery"
upvoted 2 times
...
alocin
2 years, 2 months ago
From Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide chapter 8 page 303 The containment, eradication, and recovery phase includes the following activities: ■ Gathering and handling evidence ■ Identifying the attacking hosts ■ Choosing a containment strategy to effectively contain and eradicate the attack, as well as to successfully recover from it
upvoted 3 times
ivlis_27
2 years ago
for me, i think the right answer is A, because in eradication process you identify the attacked hosts not the attacking hosts, meanwhile in detection analysis you profile the network and system, so you can get a clue for the attacking hosts
upvoted 1 times
aplicacion101
1 year, 5 months ago
attacked hosts - recovery attacking hosts - contaiment
upvoted 1 times
...
...
...
anonymous1966
2 years, 3 months ago
Preparation --> Detection and Analysis --> Containment, Erradicaion and Recovery --> Post-Incident Activity Detection and Analysis --> Profile networks and systems, Understand normal behaviors, Create a log retention policy, Perform event correlation. Maintain and use a knowledge base of information.Use Internet search engines for research. Run packet sniffers to collect additional data. Filter the data. Seek assistance from others. Keep all host clocks synchronized. Know the different types of attacks and attack vectors. Develop processes and procedures to recognize the signs of an incident. Understand the sources of precursors and indicators. Create appropriate incident documentation capabilities and processes. Create processes to effectively prioritize security incidents. Create processes to effectively communicate incident information (internal and external communications). Ref: Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
upvoted 3 times
anonymous1966
2 years, 3 months ago
Correct = A
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...