Cisco 200-201 Practice Test - Questions Answers, Page 23
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 221
 
                            
                            
                                What is a scareware attack?
Question 222
 
                            
                            
                                Refer to the exhibit.
Which tool was used to generate this data?
Question 223
 
                            
                            
                                Which process represents the application-level allow list?
Question 224
 
                            
                            
                                Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?
Question 225
 
                            
                            
                                What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?
Question 226
 
                            
                            
                                Which information must an organization use to understand the threats currently targeting the organization?
Question 227
 
                            
                            
                                What is threat hunting?
Question 228
 
                            
                            
                                An engineer is working with the compliance teams to identify the data passing through the network. During analysis, the engineer informs the compliance team that external penmeter data flows contain records, writings, and artwork Internal segregated network flows contain the customer choices by gender, addresses, and product preferences by age. The engineer must identify protected data. Which two types of data must be identified'? (Choose two.)
Question 229
 
                            
                            
                                What describes the impact of false-positive alerts compared to false-negative alerts?
Question 230
 
                            
                            
                                Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command. How must the engineer interpret the results?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question