Cisco 200-201 Practice Test - Questions Answers, Page 17
List of questions
Related questions
Refer to the exhibit.
Which type of attack is being executed?
SQL injection
cross-site scripting
cross-site request forgery
command injection
Which attack represents the evasion technique of resource exhaustion?
SQL injection
man-in-the-middle
bluesnarfing
denial-of-service
A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
event name, log source, time, source IP, and host name
protocol, source IP, source port, destination IP, and destination port
event name, log source, time, source IP, and username
protocol, log source, source IP, destination IP, and host name
Which event is a vishing attack?
obtaining disposed documents from an organization
using a vulnerability scanner on a corporate network
setting up a rogue access point near a public hotspot
impersonating a tech support agent during a phone call
What is indicated by an increase in IPv4 traffic carrying protocol 41 ?
additional PPTP traffic due to Windows clients
unauthorized peer-to-peer traffic
deployment of a GRE network on top of an existing Layer 3 network
attempts to tunnel IPv6 traffic through an IPv4 network
What is the impact of false positive alerts on business compared to true positive?
True positives affect security as no alarm is raised when an attack has taken place, while false positives are alerts raised appropriately to detect and further mitigate them.
True-positive alerts are blocked by mistake as potential attacks, while False-positives are actual attacks Identified as harmless.
False-positive alerts are detected by confusion as potential attacks, while true positives are attack attempts identified appropriately.
False positives alerts are manually ignored signatures to avoid warnings that are already acknowledged, while true positives are warnings that are not yet acknowledged.
An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?
by most active source IP
by most used ports
based on the protocols used
based on the most used applications
What is an incident response plan?
an organizational approach to events that could lead to asset loss or disruption of operations
an organizational approach to security management to ensure a service lifecycle and continuous improvements
an organizational approach to disaster recovery and timely restoration of operational services
an organizational approach to system backup and data archiving aligned to regulations
An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN. What is causing this issue?
incorrect TCP handshake
incorrect UDP handshake
incorrect OSI configuration
incorrect snaplen configuration
A security incident occurred with the potential of impacting business services. Who performs the attack?
malware author
threat actor
bug bounty hunter
direct competitor
Question