Cisco 200-201 Practice Test - Questions Answers, Page 12
List of questions
Related questions
An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?
The computer has a HIPS installed on it.
The computer has a NIPS installed on it.
The computer has a HIDS installed on it.
The computer has a NIDS installed on it.
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
A policy violation is active for host 10.10.101.24.
A host on the network is sending a DDoS attack to another inside host.
There are three active data exfiltration alerts.
A policy violation is active for host 10.201.3.149.
What is a difference between tampered and untampered disk images?
Tampered images have the same stored and computed hash.
Untampered images are deliberately altered to preserve as evidence.
Tampered images are used as evidence.
Untampered images are used for forensic investigations.
What is a sandbox interprocess communication service?
A collection of rules within the sandbox that prevent the communication between sandboxes.
A collection of network services that are activated on an interface, allowing for inter-port communication.
A collection of interfaces that allow for coordination of activities among processes.
A collection of host services that allow for communication between sandboxes.
Which regular expression matches 'color' and 'colour'?
colo?ur
col[08]+our
colou?r
col[09]+our
Which artifact is used to uniquely identify a detected file?
file timestamp
file extension
file size
file hash
A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?
application whitelisting/blacklisting
network NGFW
host-based IDS
antivirus/antispyware software
Which utility blocks a host portscan?
HIDS
sandboxing
host-based firewall
antimalware
An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?
true negative
false negative
false positive
true positive
Which signature impacts network traffic by causing legitimate traffic to be blocked?
false negative
true positive
true negative
false positive
Question