ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)

UDP port to which the traffic is destined

UDP port to which the traffic is destined

TCP port from which the traffic was sourced

TCP port from which the traffic was sourced

source IP address of the packet

source IP address of the packet

destination IP address of the packet

destination IP address of the packet

UDP port from which the traffic is sourced

UDP port from which the traffic is sourced

Suggested answer: C, D
Explanation:

The IPv4 protocol header contains various fields that provide essential information for routing and delivery of packets across an IP network. Two key pieces of information collected from the IPv4 header are the source IP address and the destination IP address of the packet.These addresses are crucial for identifying where a packet is coming from and where it is intended to go12.

asked 07/10/2024
Mariusz Lewandowski
47 questions

Question 122

Report Export Collapse

Which HTTP header field is used in forensics to identify the type of browser used?

referrer

referrer

host

host

user-agent

user-agent

accept-language

accept-language

Suggested answer: C
Explanation:

Theuser-agentHTTP header field is used in forensics to identify the type of browser used. It contains a characteristic string that allows network protocol peers to identify the operating system and browser of the web-server.This information is crucial in forensic analysis as it can provide insights into the client's environment1.

asked 07/10/2024
Michael Grisonichi
44 questions

Question 123

Report Export Collapse

Which event artifact is used to identify HTTP GET requests for a specific file?

destination IP address

destination IP address

TCP ACK

TCP ACK

HTTP status code

HTTP status code

URI

URI

Suggested answer: D
Explanation:

The Uniform Resource Identifier (URI) is used to identify specific resources on the internet, including files. In the context of HTTP GET requests, the URI specifies the path to the file being requested.

asked 07/10/2024
Wilfried Bret
35 questions

Question 124

Report Export Collapse

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

Tapping interrogation replicates signals to a separate port for analyzing traffic

Tapping interrogation replicates signals to a separate port for analyzing traffic

Tapping interrogations detect and block malicious traffic

Tapping interrogations detect and block malicious traffic

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies

Inline interrogation detects malicious traffic but does not block the traffic

Inline interrogation detects malicious traffic but does not block the traffic

Suggested answer: A
Explanation:

Traffic tapping involves replicating network traffic and sending it to a separate port where it can be analyzed without affecting the original traffic flow. This allows security analysts to monitor and analyze traffic for potential threats without the risk of blocking legitimate traffic.

asked 07/10/2024
Kingsley Tibs
44 questions

Question 125

Report Export Collapse

At which layer is deep packet inspection investigated on a firewall?

internet

internet

transport

transport

application

application

data link

data link

Suggested answer: C
Explanation:

Deep packet inspection (DPI) is a sophisticated method of examining the content of data packets as they pass through a network checkpoint, including both the header and the data payload. DPI is typically performed at the application layer of the Open Systems Interconnection (OSI) model.This allows the inspection process to evaluate the actual content of the packets, not just the header information, enabling the identification of various types of threats and the enforcement of network policies1.

asked 07/10/2024
Kenneth Joines
43 questions

Question 126

Report Export Collapse

What is a difference between inline traffic interrogation and traffic mirroring?

Inline inspection acts on the original traffic data flow

Inline inspection acts on the original traffic data flow

Traffic mirroring passes live traffic to a tool for blocking

Traffic mirroring passes live traffic to a tool for blocking

Traffic mirroring inspects live traffic for analysis and mitigation

Traffic mirroring inspects live traffic for analysis and mitigation

Inline traffic copies packets for analysis and security

Inline traffic copies packets for analysis and security

Suggested answer: A
Explanation:

Inline traffic interrogation analyzes traffic in real time and has the ability to prevent certain traffic from being forwarded Traffic mirroring doesn't pass the live traffic instead it copies traffic from one or more source ports and sends the copied traffic to one or more destinations for analysis by a network analyzer or other monitoring device

asked 07/10/2024
Alex Fill
33 questions

Question 127

Report Export Collapse

A system administrator is ensuring that specific registry information is accurate.

Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?

file extension associations

file extension associations

hardware, software, and security settings for the system

hardware, software, and security settings for the system

currently logged in users, including folders and control panel settings

currently logged in users, including folders and control panel settings

all users on the system, including visual settings

all users on the system, including visual settings

Suggested answer: B
Explanation:

https://docs.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users

asked 07/10/2024
William Dalgo
35 questions

Question 128

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 128 109305 10072024004349000000

Which packet contains a file that is extractable within Wireshark?

2317

2317

1986

1986

2318

2318

2542

2542

Suggested answer: C
Explanation:

Packet number 2318 is the one that contains a file that is extractable within Wireshark.This can be determined by the information provided in the packet details, which typically includes an HTTP GET request indicating the retrieval of a file, such as an image or document1.

asked 07/10/2024
Steven Moran
37 questions

Question 129

Report Export Collapse

Which regex matches only on all lowercase letters?

[az]+

[az]+

[^az]+

[^az]+

az+

az+

a*z+

a*z+

Suggested answer: A
Explanation:

The regex[az]+matches one or more lowercase letters from a to z.The plus sign (+) indicates that the preceding character set[az]can appear one or more times, thus matching strings of only lowercase letters1.

asked 07/10/2024
Haleem SHITOU OGUNGBEMI
45 questions

Question 130

Report Export Collapse

While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header.

Which technology makes this behavior possible?

encapsulation

encapsulation

TOR

TOR

tunneling

tunneling

NAT

NAT

Suggested answer: D
Explanation:

Network Address Translation (NAT) is the technology that allows a single IP address to send and receive traffic for multiple devices by modifying the IP header.NAT remaps one IP address space into another, enabling multiple devices to use a single public IP address to send and receive packets through the Internet2.

asked 07/10/2024
Tom Säll
42 questions
Total 331 questions
Go to page: of 34