ExamGecko
Home / Cisco / 200-201 / List of questions
Ask Question

Cisco 200-201 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

Refer to the exhibit.

Cisco 200-201 image Question 30 63879656099083369354678

Refer to the exhibit. An engineer must map these events to the source technology that generated the event logs. To which technology do the generated logs belong?

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

An engineer received a ticket to investigate a potentially malicious file detected by a malware scanner that was trying to execute multiple commands. During the initial review, the engineer discovered that the file was created two days prior. Further analyses show that the file was downloaded from a known malicious domain after a successful phishing attempt on an asset owner. At which phase of the Cyber Kill Chain was this attack mitigated?

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

Which management concept best describes developing, operating, maintaining, upgrading, and disposing of all resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

Developers must implement tasks on remote Windows environments. They decided to use scripts for enterprise applications through PowerShell. Why does the functionality not work?

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

A forensic investigator is analyzing a recent breach case. An external USB drive was discovered to be connected and transmitting the data outside of the organization, and the owner of the USB drive could not be identified. Video surveillance shows six people during a two-month period had close contact with the affected asset. How must this type of evidence be categorized?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

What is a disadvantage of the asymmetric encryption system?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

Which data capture includes payload and header information?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

What is the key difference between mandatory access control (MAC) and discretionary access control (DAC)?

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

Which two protocols are used for DDoS amplification attacks? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

What is the purpose of a ransomware attack?

Become a Premium Member for full access
  Unlock Premium Member
Total 378 questions
Go to page: of 38