ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 28

List of questions

Question 271

Report Export Collapse

Which type of data must an engineer capture to analyze payload and header information?

Become a Premium Member for full access
  Unlock Premium Member

Question 272

Report Export Collapse

What are two differences between tampered disk images and untampered disk images'? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 273

Report Export Collapse

According to CVSS, what is a description of the attack vector score?

Become a Premium Member for full access
  Unlock Premium Member

Question 274

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 274 109451 10072024004349000000

A suspicious IP address is tagged by Threat Intelligence as a brute-force attempt source After the attacker produces many of failed login entries, it successfully compromises the account. Which stakeholder is responsible for the incident response detection step?

Become a Premium Member for full access
  Unlock Premium Member

Question 275

Report Export Collapse

Which type of attack is a blank email with the subject 'price deduction' that contains a malicious attachment?

Become a Premium Member for full access
  Unlock Premium Member

Question 276

Report Export Collapse

What matches the regular expression c(rgr)+e?

Become a Premium Member for full access
  Unlock Premium Member

Question 277

Report Export Collapse

Which evasion method involves performing actions slower than normal to prevent detection?

Become a Premium Member for full access
  Unlock Premium Member

Question 278

Report Export Collapse

What is a difference between a threat and a risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 279

Report Export Collapse

How can TOR impact data visibility inside an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 280

Report Export Collapse

An engineer is working on a ticket for an incident from the incident management team A week ago. an external web application was targeted by a DDoS attack Server resources were exhausted and after two hours it crashed. An engineer was able to identify the attacker and technique used Three hours after the attack, the server was restored and the engineer recommended implementing mitigation by Blackhole filtering and transferred the incident ticket back to the IR team According to NIST SP800-61, at which phase of the incident response did the engineer finish work?

Become a Premium Member for full access
  Unlock Premium Member
Total 331 questions
Go to page: of 34