ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 34

Add to Whishlist

List of questions

Question 331

Report Export Collapse

A user reports difficulties accessing certain external web pages. When an engineer examines traffic to and from the external domain in full packet captures, they notice that many SYNs have the same sequence number, source, and destination IP address, but they have different payloads. What is causing this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 332

Report Export Collapse

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

Become a Premium Member for full access
  Unlock Premium Member

Question 333

Report Export Collapse

What is a difference between rule-based and role-based access control mechanisms?

Become a Premium Member for full access
  Unlock Premium Member

Question 334

Report Export Collapse

A large load of data is being transferred to an external destination via UDP 53 port. Which obfuscation technique is used?

Become a Premium Member for full access
  Unlock Premium Member

Question 335

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 4 63879656098942748588481

Refer to the exhibit. Which alert is identified from this packet?

Become a Premium Member for full access
  Unlock Premium Member

Question 336

Report Export Collapse

In digital communications, which method is recommended for securely exchanging public keys between users T0n2262144790 and D4n4126220794?

Become a Premium Member for full access
  Unlock Premium Member

Question 337

Report Export Collapse

What is the impact of encapsulation on the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 338

Report Export Collapse

According to CVSS, what is attack complexity?

Become a Premium Member for full access
  Unlock Premium Member

Question 339

Report Export Collapse

What describes the usage of a rootkit in endpoint based attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 340

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 9 63879656098973997160242

Refer to the exhibit. Which set of actions must an engineer perform to identify and fix this issue?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38