Cisco 200-201 Practice Test - Questions Answers, Page 37

List of questions
Question 361

Refer to the exhibit.
Refer to the exhibit. An engineer must map these events to the source technology that generated the event logs. To which technology do the generated logs belong?
Question 362

An engineer received a ticket to investigate a potentially malicious file detected by a malware scanner that was trying to execute multiple commands. During the initial review, the engineer discovered that the file was created two days prior. Further analyses show that the file was downloaded from a known malicious domain after a successful phishing attempt on an asset owner. At which phase of the Cyber Kill Chain was this attack mitigated?
Question 363

Which management concept best describes developing, operating, maintaining, upgrading, and disposing of all resources?
Question 364

Developers must implement tasks on remote Windows environments. They decided to use scripts for enterprise applications through PowerShell. Why does the functionality not work?
Question 365

A forensic investigator is analyzing a recent breach case. An external USB drive was discovered to be connected and transmitting the data outside of the organization, and the owner of the USB drive could not be identified. Video surveillance shows six people during a two-month period had close contact with the affected asset. How must this type of evidence be categorized?
Question 366

What is a disadvantage of the asymmetric encryption system?
Question 367

Which data capture includes payload and header information?
Question 368

What is the key difference between mandatory access control (MAC) and discretionary access control (DAC)?
Question 369

Which two protocols are used for DDoS amplification attacks? (Choose two.)
Question 370

What is the purpose of a ransomware attack?
Question