Cisco 200-201 Practice Test - Questions Answers, Page 26
List of questions
Question 251

Why is HTTPS traffic difficult to screen?
Question 252

Refer to the exhibit.
An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?
Question 253

Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
Question 254

Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?
Question 255

An employee received an email from a colleague's address asking for the password for the domain controller. The employee noticed a missing letter within the sender's address. What does this incident describe?
Question 256

What is the difference between indicator of attack (loA) and indicators of compromise (loC)?
Question 257

Refer to the exhibit.
An attacker scanned the server using Nmap. What did the attacker obtain from this scan?
Question 258

An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison
The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path then locked for a corresponding registry in the registry editor The engineer enabled 'Audiosrv' in task manager and put it on auto start and the problem was solved Which two components of the OS did the engineer touch? (Choose two)
Question 259

During which phase of the forensic process are tools and techniques used to extract information from the collected data?
Question 260

Which attack method is being used when an attacker tries to compromise a network with an authentication system that uses only 4-digit numeric passwords and no username?
Question