Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 200-201 Topic 2 Question 94 Discussion

Actual exam question for Cisco's 200-201 exam
Question #: 94
Topic #: 2
[All 200-201 Questions]

An engineer must configure network systems to detect command-and-control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology must be used to accomplish this task?

Show Suggested Answer Hide Answer
Suggested Answer: C

Digital certificates are essential for decrypting ingress and egress perimeter traffic, as they provide the necessary encryption keys for secure communications. By using digital certificates, network security devices can inspect the decrypted traffic to detect any malicious outbound communications that may indicate command-and-control activity.


Contribute your Thoughts:

Herschel
3 months ago
Cipher suite, for sure. That's the way to go to peek under the hood of that encrypted traffic. Wink wink, nudge nudge.
upvoted 0 times
...
Walton
3 months ago
Hmm, I'm not sure static IP addresses would help with decrypting traffic. Gotta be one of the other options.
upvoted 0 times
Salome
1 months ago
That makes sense, it would help in detecting malicious outbound communications.
upvoted 0 times
...
Ailene
1 months ago
Yeah, they provide a way to verify the identity of the communicating parties.
upvoted 0 times
...
Yuette
1 months ago
Agreed, digital certificates are commonly used for secure communication.
upvoted 0 times
...
Selma
1 months ago
I think digital certificates would be the best option for decrypting traffic.
upvoted 0 times
...
Billye
2 months ago
D) cipher suite
upvoted 0 times
...
Salena
2 months ago
C) digital certificates
upvoted 0 times
...
Lettie
2 months ago
B) signatures
upvoted 0 times
...
Luisa
2 months ago
A) static IP addresses
upvoted 0 times
...
...
Billi
3 months ago
I think signatures could also help in detecting malicious communications.
upvoted 0 times
...
Apolonia
3 months ago
I'm not sure, but I think C) digital certificates could also be used for this task.
upvoted 0 times
...
Chantell
3 months ago
Digital certificates? Nah, that's more for authentication. I'd say cipher suite is the way to go to decrypt that traffic.
upvoted 0 times
...
Jamika
3 months ago
This seems like a classic case of network security monitoring. I'd go with option B - signatures.
upvoted 0 times
Rolland
3 months ago
I think digital certificates could also be useful in this scenario.
upvoted 0 times
...
Jesus
3 months ago
I agree, signatures are essential for detecting malicious communications.
upvoted 0 times
...
...
Mary
3 months ago
I agree with Burma, cipher suite makes sense for decrypting traffic.
upvoted 0 times
...
Burma
3 months ago
I think the answer is D) cipher suite.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77