exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 16 discussion

Actual exam question from Cisco's 200-201
Question #: 16
Topic #: 1
[All 200-201 Questions]

What is the function of a command and control server?

  • A. It enumerates open ports on a network device
  • B. It drops secondary payload into malware
  • C. It is used to regain control of the network after a compromise
  • D. It sends instruction to a compromised system
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
drdecker100
Highly Voted 1 year, 2 months ago
Selected Answer: D
The function of a command and control (C2) server is to send instructions to a compromised system, also known as a bot or a zombie. Once a system is compromised by malware such as a botnet, the C2 server acts as a central point of control for the attacker to send commands to the compromised systems. These commands could include downloading additional malware or executing specific commands on the compromised system, such as launching a distributed denial-of-service (DDoS) attack or stealing sensitive information. Enumerating open ports on a network device is a network scanning technique that is not directly related to the function of a C2 server. Dropping secondary payloads into malware may be a function of a specific type of malware, but it is not a primary function of a C2 server. Regaining control of a network after a compromise is typically done through incident response procedures and is not a function of a C2 server.
upvoted 6 times
...
Leo_Visser
Highly Voted 2 years, 10 months ago
B could be considered correct but in the attack kill chain the mallware is used to get access to the system. The command and Control server is then used to get "hand on the keyboard" and from there start performing actions. So answer D is the correct answer. See also: https://en.wikipedia.org/wiki/Kill_chain#Attack_phases_and_countermeasures
upvoted 6 times
...
WISDOM2080
Most Recent 7 months, 3 weeks ago
D. It sends instruction to a compromised system
upvoted 1 times
...
kyle942
1 year, 7 months ago
page 546, Santos, listening to a beacon from the target.
upvoted 1 times
...
halamah
2 years, 5 months ago
D IS CORRECT ,,THROUGH CALLOUT CONNECTION
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago