ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 30

List of questions

Question 291

Report Export Collapse

DRAG DROP

Drag and drop the security concept from the left onto the example of that concept on the right.


Become a Premium Member for full access
  Unlock Premium Member

Question 292

Report Export Collapse

DRAG DROP

Drag and drop the type of evidence from the left onto the description of that evidence on the right.


Become a Premium Member for full access
  Unlock Premium Member

Question 293

Report Export Collapse

DRAG DROP

Drag and drop the event term from the left onto the description on the right.


Become a Premium Member for full access
  Unlock Premium Member

Question 294

Report Export Collapse

DRAG DROP

Drag and drop the data source from the left onto the data type on the right.


Become a Premium Member for full access
  Unlock Premium Member

Question 295

Report Export Collapse

DRAG DROP

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.


Become a Premium Member for full access
  Unlock Premium Member

Question 296

Report Export Collapse

DRAG DROP

Cisco 200-201 image Question 296 109473 10072024004349000000

Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.


Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

What is a difference between SI EM and SOAR security systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?

Become a Premium Member for full access
  Unlock Premium Member
Total 331 questions
Go to page: of 34