Cisco 200-201 Practice Test - Questions Answers, Page 26
List of questions
Related questions
Why is HTTPS traffic difficult to screen?
HTTPS is used internally and screening traffic (or external parties is hard due to isolation.
The communication is encrypted and the data in transit is secured.
Digital certificates secure the session, and the data is sent at random intervals.
Traffic is tunneled to a specific destination and is inaccessible to others except for the receiver.
Refer to the exhibit.
An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?
Win32.polip.a.exe is an executable file and should be flagged as malicious.
The file is clean and does not represent a risk.
Cuckoo cleaned the malicious file and prepared it for usage.
MD5 of the file was not identified as malicious.
Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
detection and analysis
post-incident activity
vulnerability scoring
vulnerability management
risk assessment
Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?
Biba
Object-capability
Take-Grant
Zero Trust
An employee received an email from a colleague's address asking for the password for the domain controller. The employee noticed a missing letter within the sender's address. What does this incident describe?
brute-force attack
insider attack
shoulder surfing
social engineering
What is the difference between indicator of attack (loA) and indicators of compromise (loC)?
loA is the evidence that a security breach has occurred, and loC allows organizations to act before the vulnerability can be exploited.
loA refers to the individual responsible for the security breach, and loC refers to the resulting loss.
loC is the evidence that a security breach has occurred, and loA allows organizations to act before the vulnerability can be exploited.
loC refers to the individual responsible for the security breach, and loA refers to the resulting loss.
Refer to the exhibit.
An attacker scanned the server using Nmap. What did the attacker obtain from this scan?
Identified a firewall device preventing the pert state from being returned.
Identified open SMB ports on the server
Gathered information on processes running on the server
Gathered a list of Active Directory users
An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison
The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path then locked for a corresponding registry in the registry editor The engineer enabled 'Audiosrv' in task manager and put it on auto start and the problem was solved Which two components of the OS did the engineer touch? (Choose two)
permissions
PowerShell logs
service
MBR
process and thread
During which phase of the forensic process are tools and techniques used to extract information from the collected data?
investigation
examination
reporting
collection
Which attack method is being used when an attacker tries to compromise a network with an authentication system that uses only 4-digit numeric passwords and no username?
SQL injection
dictionary
replay
cross-site scripting
Question