Cisco 200-201 Practice Test - Questions Answers, Page 10
List of questions
Related questions
Refer to the exhibit.
What is occurring in this network traffic?
High rate of SYN packets being sent from a multiple source towards a single destination IP.
High rate of ACK packets being sent from a single source IP towards multiple destination IPs.
Flood of ACK packets coming from a single source IP to multiple destination IPs.
Flood of SYN packets coming from a single source IP to a single destination IP.
An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)
management and reporting
traffic filtering
adaptive AVC
metrics collection and exporting
application recognition
Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?
Hypertext Transfer Protocol
SSL Certificate
Tunneling
VPN
An engineer is investigating a case of the unauthorized usage of the ''Tcpdump'' tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?
tagged protocols being used on the network
all firewall alerts and resulting mitigations
tagged ports being used on the network
all information and data within the datagram
At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?
Phishing attack
Password Revelation Strategy
Piggybacking
Social Engineering
Which security monitoring data type requires the largest storage space?
transaction data
statistical data
session data
full packet capture
What are two denial of service attacks? (Choose two.)
MITM
TCP connections
ping of death
UDP flooding
code red
An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
nmap --top-ports 192.168.1.0/24
nmap --sP 192.168.1.0/24
nmap -sL 192.168.1.0/24
nmap -sV 192.168.1.0/24
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
Base64 encoding
TLS encryption
SHA-256 hashing
ROT13 encryption
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?
best evidence
prima facie evidence
indirect evidence
physical evidence
Question