Cisco 200-201 Practice Test - Questions Answers, Page 29
List of questions
Related questions
An organization that develops high-end technology is going through an internal audit The organization uses two databases The main database stores patent information and a secondary database stores employee names and contact information A compliance team is asked to analyze the infrastructure and identify protected data Which two types of protected data should be identified? (Choose two)
Personally Identifiable Information (Pll)
Payment Card Industry (PCI)
Protected Hearth Information (PHI)
Intellectual Property (IP)
Sarbanes-Oxley (SOX)
What is sliding window anomaly detection?
Detect changes in operations and management processes.
Identify uncommon patterns that do not fit usual behavior.
Define response times for requests for owned applications.
Apply lowest privilege/permission level to software
DRAG DROP
Drag and drop the security concept on the left onto the example of that concept on the right.
DRAG DROP
Drag and drop the technology on the left onto the data type the technology provides on the right.
DRAG DROP
Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.
DRAG DROP
Drag and drop the access control models from the left onto the correct descriptions on the right.
DRAG DROP
Drag and drop the technology on the left onto the data type the technology provides on the right.
DRAG DROP
Drag and drop the uses on the left onto the type of security system on the right.
DRAG DROP
Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
DRAG DROP
Drag and drop the elements from the left into the correct order for incident handling on the right.
Question