Cisco 200-201 Practice Test - Questions Answers, Page 2
List of questions
Related questions
What is the difference between the rule-based detection when compared to behavioral detection?
Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.
Rule-Based systems have established patterns that do not change with new data, while behavioral changes.
Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.
Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
NetScout
tcpdump
SolarWinds
netsh
Refer to the exhibit.
Which kind of attack method is depicted in this string?
cross-site scripting
man-in-the-middle
SQL injection
denial of service
Which two components reduce the attack surface on an endpoint? (Choose two.)
secure boot
load balancing
increased audit log levels
restricting USB ports
full packet captures at the endpoint
What is an attack surface as compared to a vulnerability?
any potential danger to an asset
the sum of all paths for data into and out of the environment
an exploitable weakness in a system or its design
the individuals who perform an attack
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
social engineering
eavesdropping
piggybacking
tailgating
Refer to the exhibit.
What is the expected result when the 'Allow subdissector to reassemble TCP streams' feature is enabled?
insert TCP subdissectors
extract a file from a packet capture
disable TCP streams
unfragment TCP
Which type of data collection requires the largest amount of storage space?
alert data
transaction data
session data
full packet capture
Which event is user interaction?
gaining root access
executing remote code
reading and writing file permission
opening a malicious file
Which security principle requires more than one person is required to perform a critical task?
least privilege
need to know
separation of duties
due diligence
Question