ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 151 109328 10072024004349000000

What does this output indicate?

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

A developer is working on a project using a Linux tool that enables writing processes to obtain these required results:

If the process is unsuccessful, a negative value is returned.

If the process is successful, 0 value is returned to the child process, and the process ID is sent to the parent process.

Which component results from this operation?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 155 109332 10072024004349000000

What is shown in this PCAP file?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

What is a difference between tampered and untampered disk images?

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

Which technology on a host is used to isolate a running application from other applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

Which data type is necessary to get information about source/destination ports?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38