Cisco 200-201 Practice Test - Questions Answers, Page 35

List of questions
Question 341

What is a Heartbleed vulnerability?
Question 342

Refer to the exhibit.
Refer to the exhibit Which TLS version does this client support?
Question 343

An engineer is sharing folders and files with different departments and got this error: 'No such file or directory'. What must the engineer verify next?
Question 344

What are the two differences between vulnerability and exploit? (Choose two.)
Question 345

Which regular expression matches loopback IP address (127.0.0.1)?
Question 346

What is the role of indicator of compromise in an investigation?
Question 347

What is the benefit of processing statistical data for security systems?
Question 348

A security specialist is investigating an incident regarding a recent major breach in the organization. The accounting data from a 24-month period is affected due to a trojan detected in a department's critical server. A security analyst investigates the incident and discovers that an incident response team member who detected a trojan during regular AV scans had made an image of the server for evidence purposes. The security analyst made an image again to compare the hashes of the two images, and they appeared to differ and do not match. Which type of evidence is the security analyst dealing with?
Question 349

The SOC team detected an ongoing port scan. After investigation, the team concluded that the scan was targeting the company servers. According to the Cyber Kill Chain model, which step must be assigned to this type of event?
Question 350

According to CVSS, which condition is required for attack complexity metrics?
Question