Cisco 200-201 Practice Test - Questions Answers, Page 23
List of questions
Related questions
What is a scareware attack?
using the spoofed email addresses to trick people into providing login credentials
overwhelming a targeted website with fake traffic
gaming access to your computer and encrypting data stored on it
inserting malicious code that causes popup windows with flashing colors
Refer to the exhibit.
Which tool was used to generate this data?
NetFlow
dnstools
firewall
tcpdump
Which process represents the application-level allow list?
allowing everything and denying specific applications protocols
allowing everything and denying specific executable files
allowing specific format files and deny executable files
allowing specific files and deny everything else
Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?
evidence collection order
data integrity
data preservation
volatile data collection
What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?
TAPS interrogation is more complex because traffic mirroring applies additional tags to data and SPAN does not alter integrity and provides full duplex network.
SPAN results in more efficient traffic analysis, and TAPS is considerably slower due to latency caused by mirroring.
TAPS replicates the traffic to preserve integrity, and SPAN modifies packets before sending them to other analysis tools
SPAN ports filter out physical layer errors, making some types of analyses more difficult, and TAPS receives all packets, including physical errors.
Which information must an organization use to understand the threats currently targeting the organization?
threat intelligence
risk scores
vendor suggestions
vulnerability exposure
What is threat hunting?
Managing a vulnerability assessment report to mitigate potential threats.
Focusing on proactively detecting possible signs of intrusion and compromise.
Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.
Attempting to deliberately disrupt servers by altering their availability
An engineer is working with the compliance teams to identify the data passing through the network. During analysis, the engineer informs the compliance team that external penmeter data flows contain records, writings, and artwork Internal segregated network flows contain the customer choices by gender, addresses, and product preferences by age. The engineer must identify protected data. Which two types of data must be identified'? (Choose two.)
SOX
PII
PHI
PCI
copyright
What describes the impact of false-positive alerts compared to false-negative alerts?
A false negative is alerting for an XSS attack. An engineer investigates the alert and discovers that an XSS attack happened A false positive is when an XSS attack happens and no alert is raised
A false negative is a legitimate attack triggering a brute-force alert. An engineer investigates the alert and finds out someone intended to break into the system A false positive is when no alert and no attack is occurring
A false positive is an event alerting for a brute-force attack An engineer investigates the alert and discovers that a legitimate user entered the wrong credential several times A false negative is when a threat actor tries to brute-force attack a system and no alert is raised.
A false positive is an event alerting for an SQL injection attack An engineer investigates the alert and discovers that an attack attempt was blocked by IPS A false negative is when the attack gets detected but succeeds and results in a breach.
Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command. How must the engineer interpret the results?
The web application is receiving a common, legitimate traffic
The engineer must gather more data.
The web application server is under a denial-of-service attack.
The server is under a man-in-the-middle attack between the web application and its database
Question