Cisco 200-201 Practice Test - Questions Answers, Page 32
List of questions
Related questions
A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?
DNS hijacking
DNS tunneling
DNS flooding
DNS amplification
Which items is an end-point application greylist used?
Items that have been established as malicious
Items that have been established as authorized
Items that have been installed with a baseline
Items before being established as harmful or malicious
Which type of data is used to detect anomalies in the network?
statistical data
alert data
transaction data
metadata
An engineer must investigate suspicious connections. Data has been gathered using a tcpdump command on a Linux device and saved as sandboxmatware2022-12-22.pcaps file. The engineer is trying to open the tcpdump in the Wireshark tool. What is the expected result?
The tool does not support Linux.
The file is opened.
The file has an incorrect extension.
The file does not support the'-' character.
Refer to the exhibit.
What does this Cuckoo sandbox report indicate?
The file is spyware.
The file will open unsecure ports when executed.
The file will open a command interpreter when executed.
The file is ransomware.
A security engineer must protect the company from known issues that trigger adware. Recently new incident has been raised that could harm the system. Which security concepts are present in this scenario?
exploit and patching
risk and evidence
analysis and remediation
vulnerability and threat
An engineer configured regular expression ''.''\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1 .[01]' on Cisco ASA firewall. What does this regular expression do?
It captures documents in an HTTP network session.
It captures .doc, .xls, and .pdf files in HTTP v1.0 and v1.1.
It captures .doc, .xls, and .ppt files extensions in HTTP v1.0.
It captures Word, Excel, and PowerPoint files in HTTPv1.0 and v1.1.
What is a comparison between rule-based and statistical detection?
Statistical is based on measured data while rule-based uses the evaluated probability approach.
Rule-based Is based on assumptions and statistical uses data Known beforehand.
Rule-based uses data known beforehand and statistical is based on assumptions.
Statistical uses the probability approach while rule-based Is based on measured data.
What is a comparison between rule-based and statistical detection?
Statistical is based on measured data while rule-based uses the evaluated probability approach.
Rule-based Is based on assumptions and statistical uses data Known beforehand.
Rule-based uses data known beforehand and statistical is based on assumptions.
Statistical uses the probability approach while rule-based Is based on measured data.
Refer to the exhibit.
Which attack is being attempted against a web application?
SQL injection
man-in-the-middle
command injection
denial of service
Question