Cisco 200-201 Practice Test - Questions Answers, Page 18
List of questions
Question 171

Refer to the exhibit.
An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?
Question 172

What is vulnerability management?
Question 173

A user received an email attachment named 'Hr405-report2609-empl094.exe' but did not run it. Which category of the cyber kill chain should be assigned to this type of event?
Question 174

An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?
Question 175

What is a difference between data obtained from Tap and SPAN ports?
Question 176

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
Question 177

What is a benefit of using asymmetric cryptography?
Question 178

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?
Question 179

A security engineer notices confidential data being exfiltrated to a domain 'Ranso4134-mware31-895' address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
Question 180

How does agentless monitoring differ from agent-based monitoring?
Question