ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 91 109268 10072024004349000000

What is occurring in this network traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

An engineer is investigating a case of the unauthorized usage of the ''Tcpdump'' tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

Which security monitoring data type requires the largest storage space?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

What are two denial of service attacks? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.

Cisco 200-201 image Question 99 109276 10072024004349000000

Which obfuscation technique is the attacker using?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.

Which type of evidence is this?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38
Search