Cisco 200-201 Practice Test - Questions Answers, Page 25
List of questions
Related questions
A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does to this type of event belong?
weaponization
delivery
exploitation
reconnaissance
According to the NIST SP 800-86. which two types of data are considered volatile? (Choose two.)
swap files
temporary files
login sessions
dump files
free space
Refer to the exhibit.
An engineer is reviewing a Cuckoo report of a file. What must the engineer interpret from the report?
The file will appear legitimate by evading signature-based detection.
The file will not execute its behavior in a sandbox environment to avoid detection.
The file will insert itself into an application and execute when the application is run.
The file will monitor user activity and send the information to an outside source.
What is the difference between deep packet inspection and stateful inspection?
Stateful inspection verifies contents at Layer 4. and deep packet inspection verifies connection at Layer 7.
Stateful inspection is more secure than deep packet inspection on Layer 7.
Deep packet inspection is more secure than stateful inspection on Layer 4.
Deep packet inspection allows visibility on Layer 7, and stateful inspection allows visibility on Layer 4.
What should an engineer use to aid the trusted exchange of public keys between user tom0411976943 and dan1968754032?
central key management server
web of trust
trusted certificate authorities
registration authority data
Which tool gives the ability to see session data in real time?
tcpdstat
trafdump
tcptrace
trafshow
What is a description of a social engineering attack?
fake offer for free music download to trick the user into providing sensitive data
package deliberately sent to the wrong receiver to advertise a new product
mistakenly received valuable order destined for another person and hidden on purpose
email offering last-minute deals on various vacations around the world with a due date and a counter
What describes a buffer overflow attack?
injecting new commands into existing buffers
fetching data from memory buffer registers
overloading a predefined amount of memory
suppressing the buffers in a process
Which are two denial-of-service attacks? (Choose two.)
TCP connections
ping of death
man-in-the-middle
code-red
UDP flooding
Refer to the exhibit. Where is the executable file?
info
tags
MIME
name
Question