Cisco 200-201 Practice Test - Questions Answers
List of questions
Related questions
Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?
resource exhaustion
tunneling
traffic fragmentation
timing attack
Refer to the exhibit.
Which application protocol is in this PCAP file?
SSH
TCP
TLS
HTTP
Which piece of information is needed for attribution in an investigation?
proxy logs showing the source RFC 1918 IP addresses
RDP allowed from the Internet
known threat actor behavior
802.1x RADIUS authentication pass arid fail logs
What does cyber attribution identify in an investigation?
cause of an attack
exploit of an attack
vulnerabilities exploited
threat actors of an attack
What is a purpose of a vulnerability management framework?
identifies, removes, and mitigates system vulnerabilities
detects and removes vulnerabilities in source code
conducts vulnerability scans on the network
manages a list of reported vulnerabilities
A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?
the intellectual property that was stolen
the defense contractor who stored the intellectual property
the method used to conduct the attack
the foreign government that conducted the attack
What is the practice of giving an employee access to only the resources needed to accomplish their job?
principle of least privilege
organizational separation
separation of duties
need to know principle
Which metric is used to capture the level of access needed to launch a successful attack?
privileges required
user interaction
attack complexity
attack vector
What is the difference between an attack vector and attack surface?
An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.
An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.
An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.
An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.
What is the principle of defense-in-depth?
Agentless and agent-based protection for security are used.
Several distinct protective layers are involved.
Access control models are involved.
Authentication, authorization, and accounting mechanisms are used.
Question