Cisco 200-201 Practice Test - Questions Answers, Page 13
List of questions
Question 121

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)
UDP port to which the traffic is destined
TCP port from which the traffic was sourced
source IP address of the packet
destination IP address of the packet
UDP port from which the traffic is sourced
The IPv4 protocol header contains various fields that provide essential information for routing and delivery of packets across an IP network. Two key pieces of information collected from the IPv4 header are the source IP address and the destination IP address of the packet.These addresses are crucial for identifying where a packet is coming from and where it is intended to go12.
Question 122

Which HTTP header field is used in forensics to identify the type of browser used?
referrer
host
user-agent
accept-language
Theuser-agentHTTP header field is used in forensics to identify the type of browser used. It contains a characteristic string that allows network protocol peers to identify the operating system and browser of the web-server.This information is crucial in forensic analysis as it can provide insights into the client's environment1.
Question 123

Which event artifact is used to identify HTTP GET requests for a specific file?
destination IP address
TCP ACK
HTTP status code
URI
The Uniform Resource Identifier (URI) is used to identify specific resources on the internet, including files. In the context of HTTP GET requests, the URI specifies the path to the file being requested.
Question 124

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
Tapping interrogation replicates signals to a separate port for analyzing traffic
Tapping interrogations detect and block malicious traffic
Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
Inline interrogation detects malicious traffic but does not block the traffic
Traffic tapping involves replicating network traffic and sending it to a separate port where it can be analyzed without affecting the original traffic flow. This allows security analysts to monitor and analyze traffic for potential threats without the risk of blocking legitimate traffic.
Question 125

At which layer is deep packet inspection investigated on a firewall?
internet
transport
application
data link
Deep packet inspection (DPI) is a sophisticated method of examining the content of data packets as they pass through a network checkpoint, including both the header and the data payload. DPI is typically performed at the application layer of the Open Systems Interconnection (OSI) model.This allows the inspection process to evaluate the actual content of the packets, not just the header information, enabling the identification of various types of threats and the enforcement of network policies1.
Question 126

What is a difference between inline traffic interrogation and traffic mirroring?
Inline inspection acts on the original traffic data flow
Traffic mirroring passes live traffic to a tool for blocking
Traffic mirroring inspects live traffic for analysis and mitigation
Inline traffic copies packets for analysis and security
Inline traffic interrogation analyzes traffic in real time and has the ability to prevent certain traffic from being forwarded Traffic mirroring doesn't pass the live traffic instead it copies traffic from one or more source ports and sends the copied traffic to one or more destinations for analysis by a network analyzer or other monitoring device
Question 127

A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?
file extension associations
hardware, software, and security settings for the system
currently logged in users, including folders and control panel settings
all users on the system, including visual settings
https://docs.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users
Question 128

Refer to the exhibit.
Which packet contains a file that is extractable within Wireshark?
2317
1986
2318
2542
Packet number 2318 is the one that contains a file that is extractable within Wireshark.This can be determined by the information provided in the packet details, which typically includes an HTTP GET request indicating the retrieval of a file, such as an image or document1.
Question 129

Which regex matches only on all lowercase letters?
[az]+
[^az]+
az+
a*z+
The regex[az]+matches one or more lowercase letters from a to z.The plus sign (+) indicates that the preceding character set[az]can appear one or more times, thus matching strings of only lowercase letters1.
Question 130

While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header.
Which technology makes this behavior possible?
encapsulation
TOR
tunneling
NAT
Network Address Translation (NAT) is the technology that allows a single IP address to send and receive traffic for multiple devices by modifying the IP header.NAT remaps one IP address space into another, enabling multiple devices to use a single public IP address to send and receive packets through the Internet2.
Question