Cisco 200-201 Practice Test - Questions Answers, Page 18
List of questions
Related questions
Refer to the exhibit.
An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?
indirect
circumstantial
corroborative
best
What is vulnerability management?
A security practice focused on clarifying and narrowing intrusion points.
A security practice of performing actions rather than acknowledging the threats.
A process to identify and remediate existing weaknesses.
A process to recover from service interruptions and restore business-critical applications
A user received an email attachment named 'Hr405-report2609-empl094.exe' but did not run it. Which category of the cyber kill chain should be assigned to this type of event?
installation
reconnaissance
weaponization
delivery
An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?
digital certificates
static IP addresses
signatures
cipher suite
What is a difference between data obtained from Tap and SPAN ports?
Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.
SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.
SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.
Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
availability
confidentiality
scope
integrity
What is a benefit of using asymmetric cryptography?
decrypts data with one key
fast data transfer
secure data transfer
encrypts data with one key
An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?
X 509 certificates
RADIUS server
CA server
web application firewall
A security engineer notices confidential data being exfiltrated to a domain 'Ranso4134-mware31-895' address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
reconnaissance
delivery
action on objectives
weaponization
How does agentless monitoring differ from agent-based monitoring?
Agentless can access the data via API. While agent-base uses a less efficient method and accesses log data through WMI.
Agent-based monitoring is less intrusive in gathering log data, while agentless requires open ports to fetch the logs
Agent-based monitoring has a lower initial cost for deployment, while agentless monitoring requires resource-intensive deployment.
Agent-based has a possibility to locally filter and transmit only valuable data, while agentless has much higher network utilization
Question