Cisco 200-201 Practice Test - Questions Answers, Page 33
List of questions
Question 321

A security engineer must investigate a recent breach within the organization. An engineer noticed that a breached workstation is trying to connect to the domain 'Ranso4730-mware92-647'. which is known as malicious. In which step of the Cyber Kill Chain is this event?
Question 322

What is data encapsulation?
Question 323

Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?
Question 324

Which of these is a defense-in-depth strategy principle?
Question 325

How low does rule-based detection differ from behavioral detection?
Question 326

Refer to exhibit.
An engineer is Investigating an Intrusion and Is analyzing the pcap file. Which two key elements must an engineer consider? (Choose two.)
Question 327

Which statement describes indicators of attack?
Question 328

How is SQL injection prevented?
Question 329

A member of the SOC team is checking the dashboard provided by the Cisco Firepower Manager for further Isolation actions. According to NIST SP800-61, in which phase of incident response is this action?
Question 330

Which action matches the weaponization step of the Cyber Kill Chain Model?
Question