ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 18

List of questions

Question 171

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 171 109348 10072024004349000000

An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

What is vulnerability management?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

A user received an email attachment named 'Hr405-report2609-empl094.exe' but did not run it. Which category of the cyber kill chain should be assigned to this type of event?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

What is a difference between data obtained from Tap and SPAN ports?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

What is a benefit of using asymmetric cryptography?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

A security engineer notices confidential data being exfiltrated to a domain 'Ranso4134-mware31-895' address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

How does agentless monitoring differ from agent-based monitoring?

Become a Premium Member for full access
  Unlock Premium Member
Total 331 questions
Go to page: of 34