Cisco 200-201 Practice Test - Questions Answers, Page 33
List of questions
Related questions
A security engineer must investigate a recent breach within the organization. An engineer noticed that a breached workstation is trying to connect to the domain 'Ranso4730-mware92-647'. which is known as malicious. In which step of the Cyber Kill Chain is this event?
Vaporization
Delivery
reconnaissance
Action on objectives
What is data encapsulation?
Browsing history is erased automatically with every session.
The protocol of the sending host adds additional data to the packet header.
Data is encrypted backwards, which makes it unusable.
Multiple hosts can be supported with only a few public IP addresses.
Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?
Display
Man-in-the-middle
Distributed denial of service
Denial of service
Which of these is a defense-in-depth strategy principle?
identify the minimum resource required per employee.
Assign the least network privileges to segment network permissions.
Provide the minimum permissions needed to perform Job functions.
Disable administrative accounts to avoid unauthorized changes.
How low does rule-based detection differ from behavioral detection?
Behavioral systems find sequences that match particular attach behaviors, and rule-based systems identify potential zero-day attacks.
Rule-based systems search for patterns linked to specific types of attacks, and behavioral systems Identify attacks per signature.
Behavioral systems have patterns are for complex environments, and rule-based systems can be used on low-mid-sized businesses.
Rule-based systems have predefined patterns, and behavioral systems learn the patterns that are specific to the environment.
Refer to exhibit.
An engineer is Investigating an Intrusion and Is analyzing the pcap file. Which two key elements must an engineer consider? (Choose two.)
Variable 'info' field and unchanging sequence number
High volume oi SYN packets with very little variance in lime
identical length of 120 and window size (64)
SYN packets acknowledged from several source IP addresses
same source IP address with a destination port 80
Which statement describes indicators of attack?
internal hosts communicate with countries outside of the business range.
Phishing attempts on an organization are blocked by mall AV.
Critical patches are missing.
A malicious file is detected by the AV software.
How is SQL injection prevented?
Address space layout randomization
Validate and sanitize user input
...in the web server as a nonprivileged user
...cost profiling
A member of the SOC team is checking the dashboard provided by the Cisco Firepower Manager for further Isolation actions. According to NIST SP800-61, in which phase of incident response is this action?
Cost-incident activity phase
Preparation phase
Selection and analyze phase
The radiation and recovery phase
Which action matches the weaponization step of the Cyber Kill Chain Model?
Develop a specific malware to exploit a vulnerable server, i
Match a known script to a vulnerability.
Construct a trojan and deliver l! to the victim.
Scan open services and ports on a server.
Question