ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Related questions











An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?

A.

The computer has a HIPS installed on it.

A.

The computer has a HIPS installed on it.

Answers
B.

The computer has a NIPS installed on it.

B.

The computer has a NIPS installed on it.

Answers
C.

The computer has a HIDS installed on it.

C.

The computer has a HIDS installed on it.

Answers
D.

The computer has a NIDS installed on it.

D.

The computer has a NIDS installed on it.

Answers
Suggested answer: C

Explanation:

The discrepancy described suggests that the system had aHost Intrusion Detection System (HIDS)installed. HIDS are designed to monitor and analyze the internals of a computing system for signs of intrusion and policy violations. While they can detect unauthorized activities, they do not take direct action to stop an attack; this is typically the role of an intrusion prevention system. Therefore, the alert was generated, but no mitigation action was taken because the HIDS does not have the capability to intervene.

Refer to the exhibit.

What is the potential threat identified in this Stealthwatch dashboard?

A.

A policy violation is active for host 10.10.101.24.

A.

A policy violation is active for host 10.10.101.24.

Answers
B.

A host on the network is sending a DDoS attack to another inside host.

B.

A host on the network is sending a DDoS attack to another inside host.

Answers
C.

There are three active data exfiltration alerts.

C.

There are three active data exfiltration alerts.

Answers
D.

A policy violation is active for host 10.201.3.149.

D.

A policy violation is active for host 10.201.3.149.

Answers
Suggested answer: D

Explanation:

The Stealthwatch dashboard indicates that there is an active policy violation associated with host 10.201.3.149. Stealthwatch is a security analytics tool that uses network telemetry to detect and respond to threats. In this case, the dashboard has flagged a policy violation, which means that activity from this host has been detected that goes against the defined security policies, potentially indicating a security threat or unauthorized access.

What is a difference between tampered and untampered disk images?

A.

Tampered images have the same stored and computed hash.

A.

Tampered images have the same stored and computed hash.

Answers
B.

Untampered images are deliberately altered to preserve as evidence.

B.

Untampered images are deliberately altered to preserve as evidence.

Answers
C.

Tampered images are used as evidence.

C.

Tampered images are used as evidence.

Answers
D.

Untampered images are used for forensic investigations.

D.

Untampered images are used for forensic investigations.

Answers
Suggested answer: D

Explanation:

The difference between tampered and untampered disk images is:

Tampered Images: These are disk images that have beenaltered or modifiedin some way after their initial creation. The stored hash and the computed hash willnot matchif the image has been tampered with.

Untampered Images: These are disk images that havenot been alteredsince their creation. They are consideredauthenticand reliable for forensic investigations. The stored hash and the computed hash willmatch, confirming that the image has remained unchanged.

Therefore, the correct answer is: D. Untampered images are used for forensic investigations.

What is a sandbox interprocess communication service?

A.

A collection of rules within the sandbox that prevent the communication between sandboxes.

A.

A collection of rules within the sandbox that prevent the communication between sandboxes.

Answers
B.

A collection of network services that are activated on an interface, allowing for inter-port communication.

B.

A collection of network services that are activated on an interface, allowing for inter-port communication.

Answers
C.

A collection of interfaces that allow for coordination of activities among processes.

C.

A collection of interfaces that allow for coordination of activities among processes.

Answers
D.

A collection of host services that allow for communication between sandboxes.

D.

A collection of host services that allow for communication between sandboxes.

Answers
Suggested answer: C

Explanation:

A sandbox interprocess communication service refers to the mechanisms that allow different processes within a sandboxed environment to communicate with each other. These interfaces are crucial for coordinating activities among processes, especially in a restricted environment like a sandbox where direct interaction with the operating system or other processes might be limited for security reasons. This communication is essential for complex applications that require different processes to work together to perform tasks.

Which regular expression matches 'color' and 'colour'?

A.

colo?ur

A.

colo?ur

Answers
B.

col[08]+our

B.

col[08]+our

Answers
C.

colou?r

C.

colou?r

Answers
D.

col[09]+our

D.

col[09]+our

Answers
Suggested answer: A

Explanation:

The regular expression that matches both ''color'' and ''colour'' iscolo?ur. In this expression, the?denotes that the preceding characteruis optional, meaning it may appear zero or one time. This allows the expression to match both the American spelling ''color'' and the British spelling ''colour''.

Which artifact is used to uniquely identify a detected file?

A.

file timestamp

A.

file timestamp

Answers
B.

file extension

B.

file extension

Answers
C.

file size

C.

file size

Answers
D.

file hash

D.

file hash

Answers
Suggested answer: D

Explanation:

A file hash is a unique identifier that is used to detect a specific file. It is generated by running a file through a cryptographic hash function, which produces a string of characters that represents the contents of the file. If even a single bit in the file changes, the resulting hash will be different, making it an effective way to identify files uniquely.

A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.

Which technology should be used to accomplish this task?

A.

application whitelisting/blacklisting

A.

application whitelisting/blacklisting

Answers
B.

network NGFW

B.

network NGFW

Answers
C.

host-based IDS

C.

host-based IDS

Answers
D.

antivirus/antispyware software

D.

antivirus/antispyware software

Answers
Suggested answer: A

Explanation:

Application whitelisting/blacklisting is a technology used to control which applications are allowed to execute on a company's corporate PCs. Whitelisting allows only approved applications to run, while blacklisting prevents specific applications from running. This approach is effective for managing application usage across an enterprise.

Which utility blocks a host portscan?

A.

HIDS

A.

HIDS

Answers
B.

sandboxing

B.

sandboxing

Answers
C.

host-based firewall

C.

host-based firewall

Answers
D.

antimalware

D.

antimalware

Answers
Suggested answer: C

Explanation:

A host-based firewall is a utility that can block unauthorized access to a computer system, including port scans. It monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?

A.

true negative

A.

true negative

Answers
B.

false negative

B.

false negative

Answers
C.

false positive

C.

false positive

Answers
D.

true positive

D.

true positive

Answers
Suggested answer: B

Explanation:

A false negative occurs when an intrusion detection system (IDS) fails to detect and report actual malicious activity. This means that a legitimate security alert has been dismissed or overlooked, allowing potentially harmful traffic to pass through the network undetected.The impact of false negatives can be significant as they represent missed opportunities to stop or mitigate security threats1.

Which signature impacts network traffic by causing legitimate traffic to be blocked?

A.

false negative

A.

false negative

Answers
B.

true positive

B.

true positive

Answers
C.

true negative

C.

true negative

Answers
D.

false positive

D.

false positive

Answers
Suggested answer: D

Explanation:

A false positive in network security is when a benign action is incorrectly flagged as malicious, leading to legitimate traffic being blocked.This can disrupt normal network operations and access to services, as the security system mistakenly identifies normal behavior as a threat1.

Total 331 questions
Go to page: of 34