Cisco 200-201 Practice Test - Questions Answers, Page 34

List of questions
Question 331

A user reports difficulties accessing certain external web pages. When an engineer examines traffic to and from the external domain in full packet captures, they notice that many SYNs have the same sequence number, source, and destination IP address, but they have different payloads. What is causing this situation?
Question 332

If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?
Question 333

What is a difference between rule-based and role-based access control mechanisms?
Question 334

A large load of data is being transferred to an external destination via UDP 53 port. Which obfuscation technique is used?
Question 335

Refer to the exhibit.
Refer to the exhibit. Which alert is identified from this packet?
Question 336

In digital communications, which method is recommended for securely exchanging public keys between users T0n2262144790 and D4n4126220794?
Question 337

What is the impact of encapsulation on the network?
Question 338

According to CVSS, what is attack complexity?
Question 339

What describes the usage of a rootkit in endpoint based attacks?
Question 340

Refer to the exhibit.
Refer to the exhibit. Which set of actions must an engineer perform to identify and fix this issue?
Question