Cisco 200-201 Practice Test - Questions Answers, Page 11
Related questions
Refer to the exhibit.
Which event is occurring?
A binary named 'submit' is running on VM cuckoo1.
A binary is being submitted to run on VM cuckoo1
A binary on VM cuckoo1 is being submitted for evaluation
A URL is being evaluated to see if it has a malicious binary
Refer to the exhibit.
In which Linux log file is this output found?
/var/log/authorization.log
/var/log/dmesg
var/log/var.log
/var/log/auth.log
An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.
Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)
signatures
host IP addresses
file size
dropped files
domain names
An analyst is exploring the functionality of different operating systems.
What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?
queries Linux devices that have Microsoft Services for Linux installed
deploys Windows Operating Systems in an automated fashion
is an efficient tool for working with Active Directory
has a Common Information Model, which describes installed hardware and software
What causes events on a Windows system to show Event Code 4625 in the log messages?
The system detected an XSS attack
Someone is trying a brute force attack on the network
Another device is gaining root access to the system
A privileged user successfully logged into the system
Refer to the exhibit.
What does the message indicate?
an access attempt was made from the Mosaic web browser
a successful access attempt was made to retrieve the password file
a successful access attempt was made to retrieve the root of the website
a denied access attempt was made to retrieve the password file
Refer to the exhibit.
This request was sent to a web application server driven by a database. Which type of web server attack is represented?
parameter manipulation
heap memory corruption
command injection
blind SQL injection
A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?
application identification number
active process identification number
runtime identification number
process identification number
An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise.
Which kind of evidence is this IP address?
best evidence
corroborative evidence
indirect evidence
forensic evidence
Which system monitors local system operation and local network access for violations of a security policy?
host-based intrusion detection
systems-based sandboxing
host-based firewall
antivirus
Question