Cisco 200-201 Practice Test - Questions Answers, Page 23
List of questions
Question 221

What is a scareware attack?
Question 222

Refer to the exhibit.
Which tool was used to generate this data?
Question 223

Which process represents the application-level allow list?
Question 224

Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?
Question 225

What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?
Question 226

Which information must an organization use to understand the threats currently targeting the organization?
Question 227

What is threat hunting?
Question 228

An engineer is working with the compliance teams to identify the data passing through the network. During analysis, the engineer informs the compliance team that external penmeter data flows contain records, writings, and artwork Internal segregated network flows contain the customer choices by gender, addresses, and product preferences by age. The engineer must identify protected data. Which two types of data must be identified'? (Choose two.)
Question 229

What describes the impact of false-positive alerts compared to false-negative alerts?
Question 230

Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command. How must the engineer interpret the results?
Question