ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 21

List of questions

Question 201

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 201 109378 10072024004349000000

What is occurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

What is a collection of compromised machines that attackers use to carry out a DDoS attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

Which type of access control depends on the job function of the user?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

The security team has detected an ongoing spam campaign targeting the organization. The team's approach is to push back the cyber kill chain and mitigate ongoing incidents. At which phase of the cyber kill chain should the security team mitigate this type of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

What describes the defense-m-depth principle?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 206 109383 10072024004349000000

A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded what would have occurred with stronger data visibility.

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

What is the impact of encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data. The engineer could not find an external USB device Which piece of information must an engineer use for attribution in an investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 209 109386 10072024004349000000

During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 210 109387 10072024004349000000

An analyst was given a PCAP file, which is associated with a recent intrusion event in the company FTP server Which display filters should the analyst use to filter the FTP traffic?

Become a Premium Member for full access
  Unlock Premium Member
Total 331 questions
Go to page: of 34