ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 15

Question list
Search
Search

Related questions











Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?

A.

CSIRT

A.

CSIRT

Answers
B.

PSIRT

B.

PSIRT

Answers
C.

public affairs

C.

public affairs

Answers
D.

management

D.

management

Answers
Suggested answer: D

Explanation:

In the context of NIST's incident response guidelines, management is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies.Management plays a key role in overseeing the incident response process to ensure that it is carried out effectively across all parts of the organization and that compliance with legal and regulatory requirements is maintained12.

NIST SP 800-61 Rev.2, Computer Security Incident Handling Guide1.

InfraExam's discussion on incident response stakeholder responsibilities

Which incidence response step includes identifying all hosts affected by an attack?

A.

detection and analysis

A.

detection and analysis

Answers
B.

post-incident activity

B.

post-incident activity

Answers
C.

preparation

C.

preparation

Answers
D.

containment, eradication, and recovery

D.

containment, eradication, and recovery

Answers
Suggested answer: A

Explanation:

The 'detection and analysis' phase of incident response includes identifying all hosts affected by an attack.This step involves analyzing the scope of the incident, determining which systems and data are impacted, and understanding the nature of the attack to inform subsequent containment and eradication efforts45.

CrowdStrike's overview of incident response frameworks and steps4.

VCEGuide's explanation of incident response steps

Which two elements are used for profiling a network? (Choose two.)

A.

session duration

A.

session duration

Answers
B.

total throughput

B.

total throughput

Answers
C.

running processes

C.

running processes

Answers
D.

listening ports

D.

listening ports

Answers
E.

OS fingerprint

E.

OS fingerprint

Answers
Suggested answer: B, D

Explanation:

Profiling a network involves various elements that provide insights into its characteristics and behaviors.Total throughput is crucial as it measures the amount of data passing from a source to a destination in a given period, reflecting the network's capacity and usage patterns1.Listening ports are also essential for profiling because they represent the entry points for network services, indicating which services are available and potentially vulnerable1.

Network profiling tools and techniques discussed in online resources23.

Direct explanations of network profile elements

Which category relates to improper use or disclosure of PII data?

A.

legal

A.

legal

Answers
B.

compliance

B.

compliance

Answers
C.

regulated

C.

regulated

Answers
D.

contractual

D.

contractual

Answers
Suggested answer: B

Explanation:

The improper use or disclosure of Personally Identifiable Information (PII) falls under the category of compliance because organizations are required to adhere to laws and regulations that protect the privacy and security of PII.This includes following guidelines set forth by privacy laws such as GDPR, HIPAA, and others that mandate the proper handling of personal data to prevent misuse and unauthorized access123.

Which type of evidence supports a theory or an assumption that results from initial evidence?

A.

probabilistic

A.

probabilistic

Answers
B.

indirect

B.

indirect

Answers
C.

best

C.

best

Answers
D.

corroborative

D.

corroborative

Answers
Suggested answer: D

Explanation:

Corroborative evidence is the type of evidence that supports a theory or an assumption that results from initial evidence.It provides additional support to the initial findings, strengthening the theory or assumption by confirming the same facts or pointing towards the same conclusion with independent pieces of evidence4567.

Which two elements are assets in the role of attribution in an investigation? (Choose two.)

A.

context

A.

context

Answers
B.

session

B.

session

Answers
C.

laptop

C.

laptop

Answers
D.

firewall logs

D.

firewall logs

Answers
E.

threat actor

E.

threat actor

Answers
Suggested answer: C, E

Explanation:

In the context of cybersecurity, an asset is anything that has value to the organization, its business operations and their continuity, including data and physical devices. In the role of attribution in an investigation, which is the process of associating an action or event with a particular individual or entity, certain assets are particularly relevant. A laptop can be an asset because it may contain data or clues that can help trace the origin of a cyber attack. Similarly, identifying the threat actor (E) is crucial for attribution, as it involves understanding who is behind the attack and their motives, which can be essential for preventing future attacks and for legal proceedings.

What is personally identifiable information that must be safeguarded from unauthorized access?

A.

date of birth

A.

date of birth

Answers
B.

driver's license number

B.

driver's license number

Answers
C.

gender

C.

gender

Answers
D.

zip code

D.

zip code

Answers
Suggested answer: B

Explanation:

Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual. Safeguarding PII is critical to protect individuals' privacy and prevent identity theft. A driver's license number (B) is considered PII because it is unique to an individual and can be used to confirm their identity. Other examples of PII include social security numbers, passport numbers, and financial account numbers. It is important to protect such information from unauthorized access to maintain personal privacy and security.

In a SOC environment, what is a vulnerability management metric?

A.

code signing enforcement

A.

code signing enforcement

Answers
B.

full assets scan

B.

full assets scan

Answers
C.

internet exposed devices

C.

internet exposed devices

Answers
D.

single factor authentication

D.

single factor authentication

Answers
Suggested answer: B

Explanation:

In a Security Operations Center (SOC) environment, a vulnerability management metric is a quantifiable measure used to assess the effectiveness of the vulnerability management program. A full assets scan is a metric that can be used to determine the coverage and frequency of vulnerability scans across all assets.This helps in identifying unscanned assets and ensuring that all parts of the network are regularly checked for vulnerabilities1.

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Vulnerability Management Metrics: 5 Metrics to Start Measuring in Your Vulnerability Management Program

Top 10 Vulnerability Management Metrics & KPIs To Measure Success

A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?

A.

CD data copy prepared in Windows

A.

CD data copy prepared in Windows

Answers
B.

CD data copy prepared in Mac-based system

B.

CD data copy prepared in Mac-based system

Answers
C.

CD data copy prepared in Linux system

C.

CD data copy prepared in Linux system

Answers
D.

CD data copy prepared in Android-based system

D.

CD data copy prepared in Android-based system

Answers
Suggested answer: A

Explanation:

The CDFS (Compact Disc File System) format is associated with the ISO 9660 standard, which is a file system for optical disc media. It is commonly used in Windows systems for CDs. When a security expert works on an ISO file saved in CDFS format, it typically indicates that the data was prepared or copied using a Windows-based system.This is because CDFS is the file system that Windows uses to read and write CDs, and the ISO file is an image of that CD data1.

Understanding CDFS (Compact Disc File System): A Comprehensive Guide2.

What type of evidence is this file?- VCEguide.com

Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)

A.

detection and analysis

A.

detection and analysis

Answers
B.

post-incident activity

B.

post-incident activity

Answers
C.

vulnerability management

C.

vulnerability management

Answers
D.

risk assessment

D.

risk assessment

Answers
E.

vulnerability scoring

E.

vulnerability scoring

Answers
Suggested answer: A, B

Explanation:

NIST Special Publication 800-61 r2 outlines the incident response process including detection and analysis, which involves identifying and validating the occurrence of incidents, and post-incident activity that focuses on lessons learned and improvements to be made after an incident has occurred.Reference:=NIST Special Publication 800-61 r2

Total 331 questions
Go to page: of 34