ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 101 109278 10072024004349000000

Which event is occurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 102

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 102 109279 10072024004349000000

In which Linux log file is this output found?

Become a Premium Member for full access
  Unlock Premium Member

Question 103

Report Export Collapse

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.

Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 104

Report Export Collapse

An analyst is exploring the functionality of different operating systems.

What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

Become a Premium Member for full access
  Unlock Premium Member

Question 105

Report Export Collapse

What causes events on a Windows system to show Event Code 4625 in the log messages?

Become a Premium Member for full access
  Unlock Premium Member

Question 106

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 106 109283 10072024004349000000

What does the message indicate?

Become a Premium Member for full access
  Unlock Premium Member

Question 107

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 107 109284 10072024004349000000

This request was sent to a web application server driven by a database. Which type of web server attack is represented?

Become a Premium Member for full access
  Unlock Premium Member

Question 108

Report Export Collapse

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?

Become a Premium Member for full access
  Unlock Premium Member

Question 109

Report Export Collapse

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise.

Which kind of evidence is this IP address?

Become a Premium Member for full access
  Unlock Premium Member

Question 110

Report Export Collapse

Which system monitors local system operation and local network access for violations of a security policy?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38