exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 87 discussion

Actual exam question from Cisco's 200-201
Question #: 87
Topic #: 1
[All 200-201 Questions]

An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications Which technology should be used to accomplish the task?

  • A. static IP addresses
  • B. cipher suite
  • C. digital certificates
  • D. signatures
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Faio
Highly Voted 1 year, 6 months ago
The answer is B. c A cipher suite is a set of cryptographic algorithms that are used to secure network communications. By configuring network systems to use a cipher suite that supports decryption, the engineer can inspect the traffic for malicious activity, including command and control communications. The other options are not correct. Option A, static IP addresses, is not a technology that can be used to decrypt traffic. Option C, digital certificates, are used to verify the identity of a sender, but they do not provide encryption. Option D, signatures, are used to verify the integrity of a message, but they do not provide encryption.
upvoted 5 times
Silexis
1 year ago
I think that you are wrong. Digital Certificates are used for encryption as well. Inspecting SSL traffic, will make a firewall appliance to behave like a man in the middle. It will terminate one side of the SSL connection and it will start another one with its own certificate. This is why, the firewall certificate will have to be trusted by all clients in Trusted Root CA store. Of course that a private key and a digital certificate in the end have a suite of ciphers but you need a digital certificate for this, to have a match and not the cipher suite used for that certificate because if you are going on this logic path, ANY certificate issued with the same cypher will work, which is very wrong...........
upvoted 2 times
...
...
Twphill
Most Recent 4 months, 4 weeks ago
Selected Answer: B
Cipher suite is the only answer that provides encryption/decryption of network traffic.
upvoted 1 times
...
alhamry
1 year, 9 months ago
Digital certificates are used to authenticate and establish trust between two communicating parties, but they do not provide the ability to decrypt traffic. The process of decrypting traffic involves using a decryption key, which is not related to digital certificates. Therefore, digital certificates are not the appropriate technology to use to accomplish the task of detecting command and control communications by decrypting ingress and egress perimeter traffic. The best answer is B, cipher suite. Cipher suites are sets of cryptographic algorithms that determine how secure network connections are established and data is encrypted. By configuring the network systems to decrypt ingress and egress perimeter traffic using a cipher suite, network security devices can inspect the traffic for command and control communications and other malicious outbound communications.
upvoted 2 times
Silexis
1 year ago
A private key is an end result of running a cypher algorithm on something - the secret. So please note that the private key is not the algorithm itself! When you configure SSL decryption on security appliances (NGFW, WSA, etc) you need to import the certificate of the appliance in Trusted ROOT CAs of clients, as the appliance in fact is doing a ssl break-through (it terminates the SSL connection to itself and starts a new one on the other side). In between, the traffic is no longer encrypted so it can be parsed for malware inspection. This being said, in my opinion, it is not the cypher you need to configure but a Digital Certificate
upvoted 1 times
...
...
mozaki
1 year, 10 months ago
Selected Answer: C
Answer: is Digital certficates The Digital Certificate can be used to encrypt the cleartext into a ciphertext, which is sent from the sending party to the other party. From cisco Modules
upvoted 2 times
...
SecurityGuy
1 year, 11 months ago
Selected Answer: B
As based on https://en.wikipedia.org/wiki/Cipher_suite The key exchange algorithm is used to exchange a key between two devices. This key is used to encrypt and "decrypt" the messages being sent between two machines.
upvoted 1 times
...
trigger4848
2 years, 2 months ago
Selected Answer: C
Enabling SSL decryption uses the root certificate on client machines, acting as certificate authority for SSL requests. This process makes it possible for SSL decryption to decrypt, perform a detailed inspection, and then re-encrypt SSL traffic before sending it off to its destination. This helps ensure that only authorized SSL traffic is traversing the network, and that malware hidden in SSL/TLS sessions is detected and remediated within the SSL decryption process.
upvoted 3 times
evaline12
2 years ago
but it not only uses certificates to encrypt/decrypt traffic, for that it needs a cipher suit "They define the method in which specific algorithms will be used to encrypt and decrypt data exchanged between a client (typically a browser) and a server (mostly a web server)." "client"=WSA "Web Server"=C&C
upvoted 1 times
Silexis
1 year ago
The cipher suites are negociated during the SSL/TLS handshake. What you can configure is a set of ciphers which are not proned to known attacks but this will never make possible the decryption of the packets for inspection!!! trigger4848 is right - Digital Certificates are needed because in a security appliance you have ssl break-through between client and server. The simple fact that all Digital Certificates are using ciphers is not relevant in this context
upvoted 1 times
...
...
...
fvanderschmudt
2 years, 6 months ago
Selected Answer: C
With SSL/TLS inspection, you can 'break open' traffic to inspect it. A cipher suite is used in encryption, but that is not relevant here (is a detail of the implementation) Hence, answer C is correct.
upvoted 3 times
...
joseph267
2 years, 6 months ago
C is the one here using Dcert to decrypt using ssl proxy
upvoted 3 times
...
Dunky
2 years, 10 months ago
You must use a Root certificate, also referred to as a Certificate Authority (CA) Signing certificate, for HTTPS decryption on the WSA.
upvoted 2 times
...
saakovv
3 years ago
is it not about SSL inspection?
upvoted 2 times
...
omita
3 years, 1 month ago
Cipher suites dictate which of these algorithms the server should use to make a secure and reliable connection. But it’s important to remember that cipher suites do not just ensure the security, but also the compatibility and performance of HTTPS connections. So, you should choose yours wisely.
upvoted 1 times
...
Dinhkk
3 years, 2 months ago
c is correct
upvoted 1 times
...
CiscoTerminator
3 years, 2 months ago
I think answer is C as well. Cipher suite is just a set of available ciphers that can be used by a device for encryption.
upvoted 2 times
...
akustic
3 years, 3 months ago
C. digital certificates - the traffic need to be decrypted for further analysis. This technology is used in proxy/WSA.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...