Cisco 200-201 Practice Test - Questions Answers, Page 21
List of questions
Related questions
Refer to the exhibit.
What is occurring?
Cross-Site Scripting attack
XML External Entitles attack
Insecure Deserialization
Regular GET requests
What is a collection of compromised machines that attackers use to carry out a DDoS attack?
subnet
botnet
VLAN
command and control
Which type of access control depends on the job function of the user?
discretionary access control
nondiscretionary access control
role-based access control
rule-based access control
The security team has detected an ongoing spam campaign targeting the organization. The team's approach is to push back the cyber kill chain and mitigate ongoing incidents. At which phase of the cyber kill chain should the security team mitigate this type of attack?
actions
delivery
reconnaissance
installation
What describes the defense-m-depth principle?
defining precise guidelines for new workstation installations
categorizing critical assets within the organization
isolating guest Wi-Fi from the focal network
implementing alerts for unexpected asset malfunctions
Refer to the exhibit.
A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded what would have occurred with stronger data visibility.
The traffic would have been monitored at any segment in the network.
Malicious traffic would have been blocked on multiple devices
An extra level of security would have been in place
Detailed information about the data in real time would have been provided
What is the impact of encryption?
Confidentiality of the data is kept secure and permissions are validated
Data is accessible and available to permitted individuals
Data is unaltered and its integrity is preserved
Data is secure and unreadable without decrypting it
An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data. The engineer could not find an external USB device Which piece of information must an engineer use for attribution in an investigation?
list of security restrictions and privileges boundaries bypassed
external USB device
receptionist and the actions performed
stolen data and its criticality assessment
Refer to the exhibit.
During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?
antivirus
proxy
IDS/IPS
firewall
Refer to the exhibit.
An analyst was given a PCAP file, which is associated with a recent intrusion event in the company FTP server Which display filters should the analyst use to filter the FTP traffic?
dstport == FTP
tcp.port==21
tcpport = FTP
dstport = 21
Question