Cisco 200-201 Practice Test - Questions Answers, Page 30
List of questions
Related questions
DRAG DROP
Drag and drop the security concept from the left onto the example of that concept on the right.
DRAG DROP
Drag and drop the type of evidence from the left onto the description of that evidence on the right.
DRAG DROP
Drag and drop the event term from the left onto the description on the right.
DRAG DROP
Drag and drop the data source from the left onto the data type on the right.
DRAG DROP
Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.
DRAG DROP
Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.
After a large influx of network traffic to externally facing devices, a security engineer begins investigating what appears to be a denial of service attack When the packet capture data is reviewed, the engineer notices that the traffic is a single SYN packet to each port Which type of attack is occurring?
traffic fragmentation
port scanning
host profiling
SYN flood
Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?
command injection
man in the middle attack
evasion methods
phishing
What is a difference between SI EM and SOAR security systems?
SOAR ingests numerous types of logs and event data infrastructure components and SIEM can fetch data from endpoint security software and external threat intelligence feeds
SOAR collects and stores security data at a central point and then converts it into actionable intelligence, and SIEM enables SOC teams to automate and orchestrate manual tasks
SIEM raises alerts in the event of detecting any suspicious activity, and SOAR automates investigation path workflows and reduces time spent on alerts
SIEM combines data collecting, standardization, case management, and analytics for a defense-in-depth concept, and SOAR collects security data antivirus logs, firewall logs, and hashes of downloaded files
A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?
reconnaissance
delivery
weaponization
exploitation
Question