Cisco 200-201 Practice Test - Questions Answers, Page 14
List of questions
Related questions
Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?
Modify the settings of the intrusion detection system.
Design criteria for reviewing alerts.
Redefine signature rules.
Adjust the alerts schedule.
What is the impact of false positive alerts on business compared to true positive?
True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.
True positive alerts are blocked by mistake as potential attacks affecting application availability.
False positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.
False positive alerts are blocked by mistake as potential attacks affecting application availability.
An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?
Firepower
Email Security Appliance
Web Security Appliance
Stealthwatch
Refer to the exhibit.
Which technology generates this log?
NetFlow
IDS
web proxy
firewall
Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
src=10.11.0.0/16 and dst=10.11.0.0/16
ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16
ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16
src==10.11.0.0/16 and dst==10.11.0.0/16
Which tool provides a full packet capture from network traffic?
Nagios
CAINE
Hydra
Wireshark
A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?
total throughput on the interface of the router and NetFlow records
output of routing protocol authentication failures and ports used
running processes on the applications and their total network usage
deep packet captures of each application flow and duration
Refer to the exhibit.
What is depicted in the exhibit?
Windows Event logs
Apache logs
IIS logs
UNIX-based syslog
Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?
AWS
IIS
Load balancer
Proxy server
An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.
What is the initial event called in the NIST SP800-61?
online assault
precursor
trigger
instigator
Question