Cisco 200-201 Practice Test - Questions Answers, Page 31
List of questions
Related questions
What is the communication channel established from a compromised machine back to the attacker?
man-in-the-middle
IDS evasion
command and control
port scanning
What is the dataflow set in the NetFlow flow-record format?
Dataflow set is a collection of HEX records.
Dataflow set provides basic information about the packet such as the NetFlow version
Dataflow set is a collection of binary patterns
Dataflow set is a collection of data records.
Refer to the exhibit.
Which alert is identified from this packet capture?
man-in-the-middle attack
ARP poisoning
brute-force attack
SQL injection
Which element is included in an incident response plan as stated m NIST SP800-617
security of sensitive information
individual approach to incident response
approval of senior management
consistent threat identification
What does the Zero Trust security model signify?
Zero Trust security means that no one is trusted by default from inside or outside the network
Zero Trust states that no users should be given enough privileges to misuse the system on their own
Zero Trust addresses access control and states that an individual should have only the minimum access privileges necessary to perform specific tasks
Zero Trust states that unless a subject is given explicit access to an object, it should be denied access to that object
Which technique is a low-bandwidth attack?
social engineering
session hijacking
evasion
phishing
Which action matches the weaponization step of the Cyber Kill Chain model?
Scan a host to find open ports and vulnerabilities
Construct the appropriate malware and deliver it to the victim.
Test and construct the appropriate malware to launch the attack
Research data on a specific vulnerability
An engineer must configure network systems to detect command-and-control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology must be used to accomplish this task?
static IP addresses
signatures
digital certificates
cipher suite
Refer to the exhibit.
A company's user HTTP connection to a malicious site was blocked according to configured policy What is the source technology used for this measure'?
network application control
firewall
IPS
web proxy
Refer to the exhibit.
What is the outcome of the command?
TCP rule that detects TCP packets with the SYN flag in an external FTP server
TCP rule that detects TCP packets with a SYN flag in the internal network
TCP rule that detects TCP packets with a ACK flag in the internal network
TCP rule that detects TCP packets with the ACK flag in an external FTP server
Question