exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 182 discussion

Actual exam question from Cisco's 200-201
Question #: 182
Topic #: 1
[All 200-201 Questions]

An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?

  • A. Recover from the threat.
  • B. Analyze the threat.
  • C. Identify lessons learned from the threat.
  • D. Reduce the probability of similar threats.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Vetterous
Highly Voted 2 years, 4 months ago
Per: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf 3.3.3 Identifying the Attacking Hosts 3.3.4 Eradication and Recovery If it were me, I would select A
upvoted 17 times
tsabee
2 years, 1 month ago
A is correct. According to Official Understanding Cisco Cybersecurity Operations Fundamentals Course It has to get answer below question in those state: Analysis -every question was answered.: Which networks, systems, or applications are affected? -OK Who or what originated the incident? -OK Which tools or attack methods are being used? -OK Which vulnerabilities are being exploited? -OK Containment -some questions were answered, and actually it was made a containment action by removed access: ("Decision points for containment may include:") What is the scope of the incident? -partially OK What is the type of device? -OK What is the network reachability of the device that has been affected by the incident? How quickly can the incident response team get containment in place? - Irrelevant in this situation How quickly is containment needed? - Irrelevant in this situation
upvoted 3 times
...
JayPEI
1 year, 6 months ago
discovered a breach, identified the threat's entry point, and !!!removed access!!! means done detection and analysis phase,so should start: containment, eradication, and recovery phase: Gathering and handling evidence Identifying the attacking hosts Choosing a containment strategy to effectively contain and eradicate the attack, successfully recover from it
upvoted 1 times
...
...
sheyshey
Most Recent 1 week, 1 day ago
Selected Answer: A
Should b A
upvoted 3 times
...
Faio
3 months, 1 week ago
C ** Containment:** According to the NIST SP 800-61 Incident Handling Guide, the incident response process consists of the following phases: ** Preparation:** This phase involves establishing incident response policies and procedures, training personnel, and developing communication plans. ** Identification:** This phase involves detecting and acknowledging an incident. ** Containment:** This phase involves limiting the spread of the incident and preventing further damage. ** Eradication:** This phase involves removing the threat actor from the system and restoring the system to normal operations. ** Recovery:** This phase involves restoring data and applications that were lost or damaged during the incident. ** Lessons learned:** This phase involves identifying what went wrong and how to prevent similar incidents from happening in the future.
upvoted 1 times
Faio
2 months, 3 weeks ago
CORRECT ANS= A
upvoted 1 times
...
...
slippery31
6 months, 2 weeks ago
CORRECT ANS= A
upvoted 1 times
...
alhamry
7 months, 2 weeks ago
Option A, "Recover from the threat," refers to the containment, eradication, and recovery phase of incident response, which is already completed in the given scenario since the engineer was able to identify the threat's entry point and remove access. Option D, "Reduce the probability of similar threats," is a proactive measure that should be taken before an incident occurs, rather than a step in the incident handling process. The next step according to the NIST SP 800-61 Incident handling guide is to analyze the threat, which involves gathering and analyzing information about the incident to determine the cause, scope, and extent of the damage. So the best answer is B.
upvoted 2 times
...
MaliDong
1 year, 1 month ago
Selected Answer: A
the engineer 'identify the .... application the threat actor targeted', means that the 'application' has not been 'fixed/repaired'. Engineer should get that application recovered.
upvoted 3 times
...
Eng_ahmedyoussef
1 year, 2 months ago
Selected Answer: D
i think D is the correct answer - the Engineer identified the threat's entry point ==> so he Analyze the threat. - the engineer removed access ==> so he Recover from the threat. the next step is to =====> **** D. Reduce the probability of similar threats.****
upvoted 4 times
...
studyelprof
1 year, 2 months ago
According to NIST 800-61 incident handling life cycle----> After an incident has been contained, eradication may be necessary to eliminate components of the incident, : Correct answer is A (Eradication and Recovery)
upvoted 1 times
...
Entivo
1 year, 4 months ago
Selected Answer: A
A. Recover from the threat. B. Analyze the threat. C. Identify lessons learned from the threat. D. Reduce the probability of similar threats. I have just read 800-61r2 and in my opinion the detection and analysis phase is over because the breach has been detected and the threat actor and vector identified. Also, the containment is complete because th engineer removed access, however in the same phase we have "recovery" which has not yet been completed. C & D are both done in the "Post Incident Activity" phase, but as we have not yet recovered from the breach, these cannot be the correct answer. Just my opinion.
upvoted 3 times
...
anonymous1966
1 year, 5 months ago
Selected Answer: C
COMPUTER SECURITY INCIDENT HANDLING GUIDE - NIST SP 800-61 3. Handling an Incident: 3.1. Preparation (2 items) 3.2. Detectiona and Analisys (7 items) 3.2.4 Incident Analysis 3.3 Containment, Eradication, and Recovery (4 items) 3.3.4 Eradication and Recovery 3.4 Post-Incident Activity 3.4.1 Lessons Learned <---- 3.4.2 Using Collected Incident Data 3.4.3 Evidence Retention To answer the question you must know in which fase of the Handling an Incident the case is. The engineer did 3.1, 3.2 and 3.3, so it is now time to 3.4. So the correct answer is "C" Ref: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
upvoted 2 times
...
adodoccletus
1 year, 5 months ago
"A" is correct
upvoted 1 times
...
DLukynskyy
1 year, 8 months ago
Selected Answer: D
Check for similar breaches right away
upvoted 1 times
...
archbbo
1 year, 10 months ago
so in the question they stated they removed access so thats 1st part, now im assuming you should prevent this from happening again. ?? so is answer D or A ? i have test next week.
upvoted 2 times
...
Franky4
1 year, 12 months ago
D - Reduce the probability of similar threats, could possibly be categorised under 'Eradication' 800.61r2 states the following for Eradication: "During eradication, it is important to identify all affected hosts within the organization so that they can be remediated." And in the checklist under the Eradication section - Identify and mitigate all vulnerabilities that were exploited - If more affected hosts are discovered (e.g., new malware infections), repeat the Detection and Analysis steps (1.1, 1.2) to identify all other affected hosts, then contain (5) and eradicate (6) the incident for them Assuming the Detection and Analysis phase has been conducted, and none of the answers fall into the Containment category... Answer (D) might be warranted. The 'similar' wording in the question makes it difficult to confirm if the aforementioned threats pertain to the impacted network or 'just in general'
upvoted 2 times
...
Jaboori
2 years ago
I think the correct answer is D.
upvoted 1 times
Jaboori
2 years ago
Sorry, the correct answer for me is A according to NIST "In recovery, administrators restore systems to normal operation, confirm that the systems are functioning normally, and (if applicable) remediate vulnerabilities to prevent similar incidents." So reducing the probability of similar threats is under Recovery.
upvoted 1 times
...
...
halamah
2 years ago
b is correct
upvoted 1 times
...
shibli_zahir
2 years ago
so what is the correct answer. please stop confusing me
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago