Cisco 200-201 Practice Test - Questions Answers, Page 22
List of questions
Question 211
Refer to the exhibit.
A network administrator is investigating suspicious network activity by analyzing captured traffic. An engineer notices abnormal behavior and discovers that the default user agent is present in the headers of requests and data being transmitted What is occurring?
Question 212
A company encountered a breach on its web servers using IIS 7 5 Dunng the investigation, an engineer discovered that an attacker read and altered the data on a secure communication using TLS 1 2 and intercepted sensitive information by downgrading a connection to export-grade cryptography. The engineer must mitigate similar incidents in the future and ensure that clients and servers always negotiate with the most secure protocol versions and cryptographic parameters. Which action does the engineer recommend?
Question 213
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
Question 214
Which technology prevents end-device to end-device IP traceability?
Question 215
What are the two differences between stateful and deep packet inspection? (Choose two )
Question 216
What is the purpose of command and control for network-aware malware?
Question 217
What do host-based firewalls protect workstations from?
Question 218
Refer to exhibit.
An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?
Question 219
Which two measures are used by the defense-m-depth strategy? (Choose two)
Question 220
Which option describes indicators of attack?
Question