Cisco 200-201 Practice Test - Questions Answers, Page 16
List of questions
Related questions
Refer to the exhibit.
What does this output indicate?
HTTPS ports are open on the server.
SMB ports are closed on the server.
FTP ports are open on the server.
Email ports are closed on the server.
Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?
The average time the SOC takes to register and assign the incident.
The total incident escalations per week.
The average time the SOC takes to detect and resolve the incident.
The total incident escalations per month.
A developer is working on a project using a Linux tool that enables writing processes to obtain these required results:
If the process is unsuccessful, a negative value is returned.
If the process is successful, 0 value is returned to the child process, and the process ID is sent to the parent process.
Which component results from this operation?
parent directory name of a file pathname
process spawn scheduled
macros for managing CPU sets
new process created by parent process
An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?
Recover from the threat.
Analyze the threat.
Identify lessons learned from the threat.
Reduce the probability of similar threats.
Refer to the exhibit.
What is shown in this PCAP file?
Timestamps are indicated with error.
The protocol is TCP.
The User-Agent is Mozilla/5.0.
The HTTP GET is encoded.
What is a difference between tampered and untampered disk images?
Tampered images have the same stored and computed hash.
Tampered images are used as evidence.
Untampered images are used for forensic investigations.
Untampered images are deliberately altered to preserve as evidence
The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?
Isolate the infected endpoint from the network.
Perform forensics analysis on the infected endpoint.
Collect public information on the malware behavior.
Prioritize incident handling based on the impact.
Which technology on a host is used to isolate a running application from other applications?
sandbox
application allow list
application block list
host-based firewall
An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?
Recovery
Detection
Eradication
Analysis
Which data type is necessary to get information about source/destination ports?
statistical data
session data
connectivity data
alert data
Question