Cisco 200-201 Practice Test - Questions Answers, Page 3
List of questions
Related questions
How is attacking a vulnerability categorized?
action on objectives
delivery
exploitation
installation
What is a benefit of agent-based protection when compared to agentless protection?
It lowers maintenance costs
It provides a centralized platform
It collects and detects all traffic locally
It manages numerous devices simultaneously
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?
decision making
rapid response
data mining
due diligence
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
confidentiality, identity, and authorization
confidentiality, integrity, and authorization
confidentiality, identity, and availability
confidentiality, integrity, and availability
What is rule-based detection when compared to statistical detection?
proof of a user's identity
proof of a user's action
likelihood of user's action
falsification of a user's identity
A user received a malicious attachment but did not run it. Which category classifies the intrusion?
weaponization
reconnaissance
installation
delivery
Which process is used when IPS events are removed to improve data integrity?
data availability
data normalization
data signature
data protection
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
sequence numbers
IP identifier
5-tuple
timestamps
What is a difference between SOAR and SIEM?
SOAR platforms are used for threat and vulnerability management, but SIEM applications are not
SIEM applications are used for threat and vulnerability management, but SOAR platforms are not
SOAR receives information from a single platform and delivers it to a SIEM
SIEM receives information from a single platform and delivers it to a SOAR
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
MAC is controlled by the discretion of the owner and DAC is controlled by an administrator
MAC is the strictest of all levels of control and DAC is object-based access
DAC is controlled by the operating system and MAC is controlled by an administrator
DAC is the strictest of all levels of control and MAC is object-based access
Question