Cisco 200-201 Practice Test - Questions Answers, Page 24
List of questions
Related questions
When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?
full packet capture
NetFlow data
session data
firewall logs
What is the difference between deep packet inspection and stateful inspection?
Deep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4.
Deep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention.
Stateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention.
Stateful inspection verifies data at the transport layer and deep packet inspection verifies data at the application layer
What is obtained using NetFlow?
session data
application logs
network downtime report
full packet capture
How does statistical detection differ from rule-based detection?
Statistical detection involves the evaluation of events, and rule-based detection requires an evaluated set of events to function.
Statistical detection defines legitimate data over time, and rule-based detection works on a predefined set of rules
Rule-based detection involves the evaluation of events, and statistical detection requires an evaluated set of events to function Rule-based detection defines
legitimate data over a period of time, and statistical detection works on a predefined set of rules
Refer to the exhibit.
What must be interpreted from this packet capture?
IP address 192.168.88 12 is communicating with 192 168 88 149 with a source port 74 to destination port 49098 using TCP protocol
IP address 192.168.88.12 is communicating with 192 168 88 149 with a source port 49098 to destination port 80 using TCP protocol.
IP address 192.168.88.149 is communicating with 192.168 88.12 with a source port 80 to destination port 49098 using TCP protocol.
IP address 192.168.88.149 is communicating with 192.168.88.12 with a source port 49098 to destination port 80 using TCP protocol.
Refer to the exhibit.
Which field contains DNS header information if the payload is a query or a response?
Z
ID
TC
QR
Refer to the exhibit.
What is occurring?
ARP flood
DNS amplification
ARP poisoning
DNS tunneling
What is the difference between vulnerability and risk?
A vulnerability is a sum of possible malicious entry points, and a risk represents the possibility of the unauthorized entry itself.
A risk is a potential threat that an exploit applies to, and a vulnerability represents the threat itself
A vulnerability represents a flaw in a security that can be exploited, and the risk is the potential damage it might cause.
A risk is potential threat that adversaries use to infiltrate the network, and a vulnerability is an exploit
An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?
phishing email
sender
HR
receiver
Refer to the exhibit.
A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?
indirect evidence
best evidence
corroborative evidence
direct evidence
Question