Cisco 200-201 Practice Test - Questions Answers, Page 33
List of questions
Question 321
A security engineer must investigate a recent breach within the organization. An engineer noticed that a breached workstation is trying to connect to the domain 'Ranso4730-mware92-647'. which is known as malicious. In which step of the Cyber Kill Chain is this event?
Question 322
What is data encapsulation?
Question 323
Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?
Question 324
Which of these is a defense-in-depth strategy principle?
Question 325
How low does rule-based detection differ from behavioral detection?
Question 326
Refer to exhibit.
An engineer is Investigating an Intrusion and Is analyzing the pcap file. Which two key elements must an engineer consider? (Choose two.)
Question 327
Which statement describes indicators of attack?
Question 328
How is SQL injection prevented?
Question 329
A member of the SOC team is checking the dashboard provided by the Cisco Firepower Manager for further Isolation actions. According to NIST SP800-61, in which phase of incident response is this action?
Question 330
Which action matches the weaponization step of the Cyber Kill Chain Model?
Question