Cisco 200-201 Practice Test - Questions Answers, Page 30
List of questions
Question 291

DRAG DROP
Drag and drop the security concept from the left onto the example of that concept on the right.
Question 292

DRAG DROP
Drag and drop the type of evidence from the left onto the description of that evidence on the right.
Question 293

DRAG DROP
Drag and drop the event term from the left onto the description on the right.
Question 294

DRAG DROP
Drag and drop the data source from the left onto the data type on the right.
Question 295

DRAG DROP
Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
Question 296

DRAG DROP
Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.
Question 297

After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?
Question 298

Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?
Question 299

What is a difference between SI EM and SOAR security systems?
Question 300

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?
Question