exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 89 discussion

Actual exam question from Cisco's 200-201
Question #: 89
Topic #: 1
[All 200-201 Questions]

When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?

  • A. firewall logs
  • B. full packet capture
  • C. session data
  • D. NetFlow data
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
akustic
Highly Voted 3 years, 7 months ago
B. full packet capture. Other data could be an indicators of data exfiltration. But only packet insight could gives answer.
upvoted 22 times
...
3000bd6
Most Recent 6 months, 3 weeks ago
Selected Answer: B
"data exfiltration" points directly to the need for a data type that allows detailed inspection of transferred content, which is why full packet capture is the best answer.
upvoted 2 times
...
ppsilva
1 year, 5 months ago
Selected Answer: B
"Provides the investigate capability" . To me it is B)
upvoted 4 times
...
fisher004
1 year, 6 months ago
Correct answer should is session data. While session data is very simple, it can be used to answer many important questions that arise regularly in the SOC. Threat intelligence reports may provide a list of suspicious external IP addresses. Session data can be consulted to see if any internal systems have communicated with any of the suspicious external IP addresses. Similarly, if a particular TCP port is associated with an active malware campaign command and control, session data can be consulted to see if any internal systems are communicating by using that TCP port. If an internal host has been identified as being compromised, session data can identify other internal systems that it has communicated with (potential lateral movement) and any external systems that it has communicated with (potential data exfiltration). This is from the Cisco U CyberOps Course
upvoted 1 times
...
CCNPTT
1 year, 6 months ago
Selected Answer: D
Full packet capture is NOT an option. The question is about if data exfiltation has ocurrED, past tense.
upvoted 2 times
...
CCNPTT
1 year, 6 months ago
Full packet capture is NOT an option. The question is about if data exfiltation has ocurrED, past tense.
upvoted 1 times
...
Faio
1 year, 8 months ago
The answer is B. full packet capture. Full packet capture is the most comprehensive type of data that can be used to investigate an event. It captures all of the data that is transmitted over a network, including the header and payload of each packet. This allows investigators to see exactly what data was sent and received, and by whom. Firewall logs, session data, and NetFlow data are all less comprehensive than full packet capture
upvoted 3 times
...
Faio
1 year, 10 months ago
B. Full packet capture is the most comprehensive type of data that can be used to investigate a data exfiltration event. It captures all of the data that is transmitted over a network, including the headers, payload, and metadata. This data can be used to identify the source and destination of the traffic, the type of data that is being transferred, and the time and date of the transfer. Firewall logs, session data, and NetFlow data can also be used to investigate data exfiltration events, but they provide less information than full packet capture.
upvoted 2 times
...
Topsecret
1 year, 11 months ago
B. full packet capture 100%
upvoted 1 times
...
drdecker100
2 years, 3 months ago
Selected Answer: B
In the context of data exfiltration, full packet capture can be used to identify the source and destination of any data that is being transferred out of the network. It can also provide insight into the type of data that is being exfiltrated, the frequency and duration of the transfers, and any other characteristics that may be relevant to the investigation.
upvoted 2 times
...
evaline12
2 years, 4 months ago
"determine if data exfiltration has occurred" basically you don't want to look into the packets just want to determine high bandwidth use, the size of these packets, best thing is to look at the metadata
upvoted 2 times
evaline12
2 years, 4 months ago
ignore this one, wsa is one dlp solution that indeed does deep content inspection
upvoted 1 times
...
...
hansamaru
2 years, 6 months ago
Selected Answer: B
B should be the correct one
upvoted 3 times
...
cy_analyst
2 years, 7 months ago
Selected Answer: C
C & D is the same data. The question says ti see if data exfiltrate, so you don't need to see the actual data with full packet capture but only if it happened. So you need only session data to get the answer. Net flow "sees" session data so both answers might be correct.
upvoted 2 times
SecurityGuy
2 years, 3 months ago
I agree with this, although Full Packet Capture provide a more comprehensive output, the question just asks if Data Exfiltration has occurred and Session Data if enough. No need to complicate things. On a certification exam, sometimes the most simplest or provides the bare minimum is the correct one.
upvoted 1 times
...
...
fyticez
2 years, 8 months ago
Selected Answer: B
Official Cert Guide - "Another product family that integrates with other DLP solutions is the Cisco WSA, which redirects all outbound traffic to a third-party DLP appliance, allowing deep content inspection for regulatory compliance and data exfiltration protection. It enables an administrator to inspect web content by title, metadata, and size and even to prevent users from storing files to cloud services such as Dropbox and Google Drive." ... I think the keyword here should be "all outbound traffic", hence B.
upvoted 2 times
fyticez
2 years, 8 months ago
Then again, on the other hand, D is also a possibility (NetFlow data could also provide the investigate capability). According to https://www.plixer.com/blog/netflow-and-internet-data-loss-prevention-alarms/ "The effort to prevent data loss is a top priority for many organizations. Identifying odd traffic patterns and suspicious data transfers has become a concern for many data security professionals. Flow Analytics, an add on to our NetFlow collector, allows administrators to detect odd traffic patterns, such as servers communicating to unauthorized hosts on the Internet." This suggests the solution does not actually implement DLP (outgoing traffic doesn't get inspected for social security numbers, credit card, resumes etc.), just helps detecting it, by alerting when certain network baseline breaches occur (eg. larger amount of exiting traffic than usual, external connections initiated outside working hours etc.)
upvoted 1 times
...
...
weganos
2 years, 9 months ago
Selected Answer: D
I also think the answer should be D "Netflow"
upvoted 2 times
...
surforlife
2 years, 11 months ago
Netflow is used for network performance analysis and behavioral analytics for security. The flows do not contain actual packet data, but rather the metadata for communications. It is a standard form of session data that details who, what, when, and where of network traffic It is similar to the call records in a phone bill, but in real time. Every network transaction typically gets two flows, one in each direction. If you were to do full capture on each interface is extraordinarily expensive. The best practice is to look at session data in the flows. Cisco Stealthwatch is such a tool and Plixer Scrutinizer! After you see the behavior then you know where to put the full capture filter!
upvoted 4 times
...
DYKO
3 years ago
Selected Answer: D
NetFlow
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...