ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 35

Add to Whishlist

List of questions

Question 341

Report Export Collapse

What is a Heartbleed vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 342

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 11 63879656098989622243880

Refer to the exhibit Which TLS version does this client support?

Become a Premium Member for full access
  Unlock Premium Member

Question 343

Report Export Collapse

An engineer is sharing folders and files with different departments and got this error: 'No such file or directory'. What must the engineer verify next?

Become a Premium Member for full access
  Unlock Premium Member

Question 344

Report Export Collapse

What are the two differences between vulnerability and exploit? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 345

Report Export Collapse

Which regular expression matches loopback IP address (127.0.0.1)?

Become a Premium Member for full access
  Unlock Premium Member

Question 346

Report Export Collapse

What is the role of indicator of compromise in an investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 347

Report Export Collapse

What is the benefit of processing statistical data for security systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 348

Report Export Collapse

A security specialist is investigating an incident regarding a recent major breach in the organization. The accounting data from a 24-month period is affected due to a trojan detected in a department's critical server. A security analyst investigates the incident and discovers that an incident response team member who detected a trojan during regular AV scans had made an image of the server for evidence purposes. The security analyst made an image again to compare the hashes of the two images, and they appeared to differ and do not match. Which type of evidence is the security analyst dealing with?

Become a Premium Member for full access
  Unlock Premium Member

Question 349

Report Export Collapse

The SOC team detected an ongoing port scan. After investigation, the team concluded that the scan was targeting the company servers. According to the Cyber Kill Chain model, which step must be assigned to this type of event?

Become a Premium Member for full access
  Unlock Premium Member

Question 350

Report Export Collapse

According to CVSS, which condition is required for attack complexity metrics?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38