ExamGecko
Home Home / Cisco / 200-201

Cisco 200-201 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Related questions











An organization that develops high-end technology is going through an internal audit The organization uses two databases The main database stores patent information and a secondary database stores employee names and contact information A compliance team is asked to analyze the infrastructure and identify protected data Which two types of protected data should be identified? (Choose two)

A.

Personally Identifiable Information (Pll)

A.

Personally Identifiable Information (Pll)

Answers
B.

Payment Card Industry (PCI)

B.

Payment Card Industry (PCI)

Answers
C.

Protected Hearth Information (PHI)

C.

Protected Hearth Information (PHI)

Answers
D.

Intellectual Property (IP)

D.

Intellectual Property (IP)

Answers
E.

Sarbanes-Oxley (SOX)

E.

Sarbanes-Oxley (SOX)

Answers
Suggested answer: A, D

Explanation:

Protected data refers to any information that is legally guarded or sensitive due to its nature. In the context of the organization described, the main database containsIntellectual Property (IP), which includes patents that are legally protected forms of inventions and designs. The secondary database holdsPersonally Identifiable Information (PII), which comprises data that can be used to identify individuals, such as names and contact details.Both IP and PII are considered protected data and should be identified during an internal audit to ensure they are handled according to legal and regulatory standards.Reference:: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

What is sliding window anomaly detection?

A.

Detect changes in operations and management processes.

A.

Detect changes in operations and management processes.

Answers
B.

Identify uncommon patterns that do not fit usual behavior.

B.

Identify uncommon patterns that do not fit usual behavior.

Answers
C.

Define response times for requests for owned applications.

C.

Define response times for requests for owned applications.

Answers
D.

Apply lowest privilege/permission level to software

D.

Apply lowest privilege/permission level to software

Answers
Suggested answer: B

Explanation:

Sliding window anomaly detection is a technique used in cybersecurity to identify unusual patterns or behaviors that deviate from the norm. It involves analyzing segments of data over a period of time, referred to as a 'window,' and comparing them against typical patterns.Anomalies are detected when observed behaviors significantly differ from expected patterns, indicating potential security incidents or issues that require further investigation.Reference:: An adaptive sliding window for anomaly detection of time series in wireless sensor networks

DRAG DROP

Drag and drop the security concept on the left onto the example of that concept on the right.


Question 283
Correct answer: Question 283

DRAG DROP

Drag and drop the technology on the left onto the data type the technology provides on the right.


Question 284
Correct answer: Question 284

DRAG DROP

Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.


Question 285
Correct answer: Question 285

DRAG DROP

Drag and drop the access control models from the left onto the correct descriptions on the right.


Question 286
Correct answer: Question 286

DRAG DROP

Drag and drop the technology on the left onto the data type the technology provides on the right.


Question 287
Correct answer: Question 287

DRAG DROP

Drag and drop the uses on the left onto the type of security system on the right.


Question 288
Correct answer: Question 288

DRAG DROP

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.


Question 289
Correct answer: Question 289

DRAG DROP

Drag and drop the elements from the left into the correct order for incident handling on the right.


Question 290
Correct answer: Question 290
Total 331 questions
Go to page: of 34