ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 12

List of questions

Question 111

Report Export Collapse

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?

The computer has a HIPS installed on it.

The computer has a HIPS installed on it.

The computer has a NIPS installed on it.

The computer has a NIPS installed on it.

The computer has a HIDS installed on it.

The computer has a HIDS installed on it.

The computer has a NIDS installed on it.

The computer has a NIDS installed on it.

Suggested answer: C
Explanation:

The discrepancy described suggests that the system had aHost Intrusion Detection System (HIDS)installed. HIDS are designed to monitor and analyze the internals of a computing system for signs of intrusion and policy violations. While they can detect unauthorized activities, they do not take direct action to stop an attack; this is typically the role of an intrusion prevention system. Therefore, the alert was generated, but no mitigation action was taken because the HIDS does not have the capability to intervene.

asked 07/10/2024
Maxim Shpakov
49 questions

Question 112

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 112 109289 10072024004349000000

What is the potential threat identified in this Stealthwatch dashboard?

A policy violation is active for host 10.10.101.24.

A policy violation is active for host 10.10.101.24.

A host on the network is sending a DDoS attack to another inside host.

A host on the network is sending a DDoS attack to another inside host.

There are three active data exfiltration alerts.

There are three active data exfiltration alerts.

A policy violation is active for host 10.201.3.149.

A policy violation is active for host 10.201.3.149.

Suggested answer: D
Explanation:

The Stealthwatch dashboard indicates that there is an active policy violation associated with host 10.201.3.149. Stealthwatch is a security analytics tool that uses network telemetry to detect and respond to threats. In this case, the dashboard has flagged a policy violation, which means that activity from this host has been detected that goes against the defined security policies, potentially indicating a security threat or unauthorized access.

asked 07/10/2024
Shane Behrendt
38 questions

Question 113

Report Export Collapse

What is a difference between tampered and untampered disk images?

Tampered images have the same stored and computed hash.

Tampered images have the same stored and computed hash.

Untampered images are deliberately altered to preserve as evidence.

Untampered images are deliberately altered to preserve as evidence.

Tampered images are used as evidence.

Tampered images are used as evidence.

Untampered images are used for forensic investigations.

Untampered images are used for forensic investigations.

Suggested answer: D
Explanation:

The difference between tampered and untampered disk images is:

Tampered Images: These are disk images that have beenaltered or modifiedin some way after their initial creation. The stored hash and the computed hash willnot matchif the image has been tampered with.

Untampered Images: These are disk images that havenot been alteredsince their creation. They are consideredauthenticand reliable for forensic investigations. The stored hash and the computed hash willmatch, confirming that the image has remained unchanged.

Therefore, the correct answer is: D. Untampered images are used for forensic investigations.

asked 07/10/2024
Harri rrapaj
34 questions

Question 114

Report Export Collapse

What is a sandbox interprocess communication service?

A collection of rules within the sandbox that prevent the communication between sandboxes.

A collection of rules within the sandbox that prevent the communication between sandboxes.

A collection of network services that are activated on an interface, allowing for inter-port communication.

A collection of network services that are activated on an interface, allowing for inter-port communication.

A collection of interfaces that allow for coordination of activities among processes.

A collection of interfaces that allow for coordination of activities among processes.

A collection of host services that allow for communication between sandboxes.

A collection of host services that allow for communication between sandboxes.

Suggested answer: C
Explanation:

A sandbox interprocess communication service refers to the mechanisms that allow different processes within a sandboxed environment to communicate with each other. These interfaces are crucial for coordinating activities among processes, especially in a restricted environment like a sandbox where direct interaction with the operating system or other processes might be limited for security reasons. This communication is essential for complex applications that require different processes to work together to perform tasks.

asked 07/10/2024
Melih Sivrikaya
40 questions

Question 115

Report Export Collapse

Which regular expression matches 'color' and 'colour'?

colo?ur

colo?ur

col[08]+our

col[08]+our

colou?r

colou?r

col[09]+our

col[09]+our

Suggested answer: A
Explanation:

The regular expression that matches both ''color'' and ''colour'' iscolo?ur. In this expression, the?denotes that the preceding characteruis optional, meaning it may appear zero or one time. This allows the expression to match both the American spelling ''color'' and the British spelling ''colour''.

asked 07/10/2024
Ali Abbas
32 questions

Question 116

Report Export Collapse

Which artifact is used to uniquely identify a detected file?

file timestamp

file timestamp

file extension

file extension

file size

file size

file hash

file hash

Suggested answer: D
Explanation:

A file hash is a unique identifier that is used to detect a specific file. It is generated by running a file through a cryptographic hash function, which produces a string of characters that represents the contents of the file. If even a single bit in the file changes, the resulting hash will be different, making it an effective way to identify files uniquely.

asked 07/10/2024
Javier Escobar
39 questions

Question 117

Report Export Collapse

A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.

Which technology should be used to accomplish this task?

application whitelisting/blacklisting

application whitelisting/blacklisting

network NGFW

network NGFW

host-based IDS

host-based IDS

antivirus/antispyware software

antivirus/antispyware software

Suggested answer: A
Explanation:

Application whitelisting/blacklisting is a technology used to control which applications are allowed to execute on a company's corporate PCs. Whitelisting allows only approved applications to run, while blacklisting prevents specific applications from running. This approach is effective for managing application usage across an enterprise.

asked 07/10/2024
Fronzino Franco
43 questions

Question 118

Report Export Collapse

Which utility blocks a host portscan?

HIDS

HIDS

sandboxing

sandboxing

host-based firewall

host-based firewall

antimalware

antimalware

Suggested answer: C
Explanation:

A host-based firewall is a utility that can block unauthorized access to a computer system, including port scans. It monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

asked 07/10/2024
Petya Pavlova
44 questions

Question 119

Report Export Collapse

An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?

true negative

true negative

false negative

false negative

false positive

false positive

true positive

true positive

Suggested answer: B
Explanation:

A false negative occurs when an intrusion detection system (IDS) fails to detect and report actual malicious activity. This means that a legitimate security alert has been dismissed or overlooked, allowing potentially harmful traffic to pass through the network undetected.The impact of false negatives can be significant as they represent missed opportunities to stop or mitigate security threats1.

asked 07/10/2024
Avishek Das
44 questions

Question 120

Report Export Collapse

Which signature impacts network traffic by causing legitimate traffic to be blocked?

false negative

false negative

true positive

true positive

true negative

true negative

false positive

false positive

Suggested answer: D
Explanation:

A false positive in network security is when a benign action is incorrectly flagged as malicious, leading to legitimate traffic being blocked.This can disrupt normal network operations and access to services, as the security system mistakenly identifies normal behavior as a threat1.

asked 07/10/2024
Jim Swift
39 questions
Total 331 questions
Go to page: of 34