Cisco 200-201 Practice Test - Questions Answers, Page 30
List of questions
Question 291
DRAG DROP
Drag and drop the security concept from the left onto the example of that concept on the right.
Question 292
DRAG DROP
Drag and drop the type of evidence from the left onto the description of that evidence on the right.
Question 293
DRAG DROP
Drag and drop the event term from the left onto the description on the right.
Question 294
DRAG DROP
Drag and drop the data source from the left onto the data type on the right.
Question 295
DRAG DROP
Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
Question 296
DRAG DROP
Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.
Question 297
After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?
Question 298
Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?
Question 299
What is a difference between SI EM and SOAR security systems?
Question 300
A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?
Question