Cisco 200-201 Practice Test - Questions Answers, Page 22
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 211
 
                            
                            
                                Refer to the exhibit.
A network administrator is investigating suspicious network activity by analyzing captured traffic. An engineer notices abnormal behavior and discovers that the default user agent is present in the headers of requests and data being transmitted What is occurring?
Question 212
 
                            
                            
                                A company encountered a breach on its web servers using IIS 7 5 Dunng the investigation, an engineer discovered that an attacker read and altered the data on a secure communication using TLS 1 2 and intercepted sensitive information by downgrading a connection to export-grade cryptography. The engineer must mitigate similar incidents in the future and ensure that clients and servers always negotiate with the most secure protocol versions and cryptographic parameters. Which action does the engineer recommend?
Question 213
 
                            
                            
                                What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
Question 214
 
                            
                            
                                Which technology prevents end-device to end-device IP traceability?
Question 215
 
                            
                            
                                What are the two differences between stateful and deep packet inspection? (Choose two )
Question 216
 
                            
                            
                                What is the purpose of command and control for network-aware malware?
Question 217
 
                            
                            
                                What do host-based firewalls protect workstations from?
Question 218
 
                            
                            
                                Refer to exhibit.
An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?
Question 219
 
                            
                            
                                Which two measures are used by the defense-m-depth strategy? (Choose two)
Question 220
 
                            
                            
                                Which option describes indicators of attack?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question