Cisco 200-201 Practice Test - Questions Answers, Page 13
List of questions
Related questions
Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)
UDP port to which the traffic is destined
TCP port from which the traffic was sourced
source IP address of the packet
destination IP address of the packet
UDP port from which the traffic is sourced
Which HTTP header field is used in forensics to identify the type of browser used?
referrer
host
user-agent
accept-language
Which event artifact is used to identify HTTP GET requests for a specific file?
destination IP address
TCP ACK
HTTP status code
URI
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
Tapping interrogation replicates signals to a separate port for analyzing traffic
Tapping interrogations detect and block malicious traffic
Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
Inline interrogation detects malicious traffic but does not block the traffic
At which layer is deep packet inspection investigated on a firewall?
internet
transport
application
data link
What is a difference between inline traffic interrogation and traffic mirroring?
Inline inspection acts on the original traffic data flow
Traffic mirroring passes live traffic to a tool for blocking
Traffic mirroring inspects live traffic for analysis and mitigation
Inline traffic copies packets for analysis and security
A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?
file extension associations
hardware, software, and security settings for the system
currently logged in users, including folders and control panel settings
all users on the system, including visual settings
Refer to the exhibit.
Which packet contains a file that is extractable within Wireshark?
2317
1986
2318
2542
Which regex matches only on all lowercase letters?
[az]+
[^az]+
az+
a*z+
While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header.
Which technology makes this behavior possible?
encapsulation
TOR
tunneling
NAT
Question