Cisco 200-201 Practice Test - Questions Answers, Page 23
List of questions
Question 221
What is a scareware attack?
Question 222
Refer to the exhibit.
Which tool was used to generate this data?
Question 223
Which process represents the application-level allow list?
Question 224
Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?
Question 225
What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?
Question 226
Which information must an organization use to understand the threats currently targeting the organization?
Question 227
What is threat hunting?
Question 228
An engineer is working with the compliance teams to identify the data passing through the network. During analysis, the engineer informs the compliance team that external penmeter data flows contain records, writings, and artwork Internal segregated network flows contain the customer choices by gender, addresses, and product preferences by age. The engineer must identify protected data. Which two types of data must be identified'? (Choose two.)
Question 229
What describes the impact of false-positive alerts compared to false-negative alerts?
Question 230
Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command. How must the engineer interpret the results?
Question