Cisco 200-201 Practice Test - Questions Answers, Page 20
List of questions
Related questions
What is a difference between signature-based and behavior-based detection?
Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.
Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.
Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.
Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.
Refer to the exhibit.
An engineer received an event log file to review. Which technology generated the log?
NetFlow
proxy
firewall
IDS/IPS
What is the difference between inline traffic interrogation and traffic mirroring?
Inline interrogation is less complex as traffic mirroring applies additional tags to data.
Traffic mirroring copies the traffic rather than forwarding it directly to the analysis tools
Inline replicates the traffic to preserve integrity rather than modifying packets before sending them to other analysis tools.
Traffic mirroring results in faster traffic analysis and inline is considerably slower due to latency.
Refer to the exhibit.
A company employee is connecting to mail google.com from an endpoint device. The website is loaded but with an error. What is occurring?
DNS hijacking attack
Endpoint local time is invalid.
Certificate is not in trusted roots.
man-m-the-middle attack
An analyst is using the SIEM platform and must extract a custom property from a Cisco device and capture the phrase, 'File: Clean.' Which regex must the analyst import?
File: Clean
^Parent File Clean$
File: Clean (.*)
^File: Clean$
What describes the concept of data consistently and readily being accessible for legitimate users?
integrity
availability
accessibility
confidentiality
Refer to the exhibit.
Which frame numbers contain a file that is extractable via TCP stream within Wireshark?
7,14, and 21
7 and 21
14,16,18, and 19
7 to 21
Refer to the exhibit.
Which stakeholders must be involved when a company workstation is compromised?
Employee 1 Employee 2, Employee 3, Employee 4, Employee 5, Employee 7
Employee 1, Employee 2, Employee 4, Employee 5
Employee 4, Employee 6, Employee 7
Employee 2, Employee 3, Employee 4, Employee 5
How does an attack surface differ from an attack vector?
An attack vector recognizes the potential outcomes of an attack, and the attack surface is choosing a method of an attack.
An attack surface identifies vulnerable parts for an attack, and an attack vector specifies which attacks are feasible to those parts.
An attack surface mitigates external vulnerabilities, and an attack vector identifies mitigation techniques and possible workarounds.
An attack vector matches components that can be exploited, and an attack surface classifies the potential path for exploitation
How does TOR alter data content during transit?
It spoofs the destination and source information protecting both sides.
It encrypts content and destination information over multiple layers.
It redirects destination traffic through multiple sources avoiding traceability.
It traverses source traffic through multiple destinations before reaching the receiver
Question