Cisco 200-201 Practice Test - Questions Answers, Page 22
List of questions
Question 211

Refer to the exhibit.
A network administrator is investigating suspicious network activity by analyzing captured traffic. An engineer notices abnormal behavior and discovers that the default user agent is present in the headers of requests and data being transmitted What is occurring?
Question 212

A company encountered a breach on its web servers using IIS 7 5 Dunng the investigation, an engineer discovered that an attacker read and altered the data on a secure communication using TLS 1 2 and intercepted sensitive information by downgrading a connection to export-grade cryptography. The engineer must mitigate similar incidents in the future and ensure that clients and servers always negotiate with the most secure protocol versions and cryptographic parameters. Which action does the engineer recommend?
Question 213

What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
Question 214

Which technology prevents end-device to end-device IP traceability?
Question 215

What are the two differences between stateful and deep packet inspection? (Choose two )
Question 216

What is the purpose of command and control for network-aware malware?
Question 217

What do host-based firewalls protect workstations from?
Question 218

Refer to exhibit.
An analyst performs the analysis of the pcap file to detect the suspicious activity. What challenges did the analyst face in terms of data visibility?
Question 219

Which two measures are used by the defense-m-depth strategy? (Choose two)
Question 220

Which option describes indicators of attack?
Question