Cisco 200-201 Practice Test - Questions Answers, Page 28
List of questions
Related questions
Which type of data must an engineer capture to analyze payload and header information?
frame check sequence
alert data
full packet
session logs
What are two differences between tampered disk images and untampered disk images'? (Choose two.)
Tampered Images are used in a security investigation process
Untampered images can be used as law enforcement evidence.
The image is untampered if the existing stored hash matches the computed one
The image is tampered if the stored hash and the computed hash are identical
Tampered images are used as an element for the root cause analysis report
According to CVSS, what is a description of the attack vector score?
The metric score will be larger when it is easier to physically touch or manipulate the vulnerable component
It depends on how many physical and logical manipulations are possible on a vulnerable component
The metric score will be larger when a remote attack is more likely.
It depends on how far away the attacker is located and the vulnerable component
Refer to the exhibit.
A suspicious IP address is tagged by Threat Intelligence as a brute-force attempt source After the attacker produces many of failed login entries, it successfully compromises the account. Which stakeholder is responsible for the incident response detection step?
employee 5
employee 3
employee 4
employee 2
Which type of attack is a blank email with the subject 'price deduction' that contains a malicious attachment?
man-in-the-middle attack
smishing
phishing attack
integrity violation
What matches the regular expression c(rgr)+e?
crgrrgre
np+e
c(rgr)e
ce
Which evasion method involves performing actions slower than normal to prevent detection?
timing attack
traffic fragmentation
resource exhaustion
tunneling
What is a difference between a threat and a risk?
A threat is a sum of risks and a risk itself represents a specific danger toward the asset
A threat can be people property, or information, and risk is a probability by which these threats may bring harm to the business
A risk is a flaw or hole in security, and a threat is what is being used against that flaw
A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against
How can TOR impact data visibility inside an organization?
increases data integrity
increases security
decreases visibility
no impact
An engineer is working on a ticket for an incident from the incident management team A week ago. an external web application was targeted by a DDoS attack Server resources were exhausted and after two hours it crashed. An engineer was able to identify the attacker and technique used Three hours after the attack, the server was restored and the engineer recommended implementing mitigation by Blackhole filtering and transferred the incident ticket back to the IR team According to NIST SP800-61, at which phase of the incident response did the engineer finish work?
preparation
post-incident activity
containment eradication and recovery
detection and analysis
Question