Cisco 200-201 Practice Test - Questions Answers, Page 37
List of questions
Question 361
Refer to the exhibit.
Refer to the exhibit. An engineer must map these events to the source technology that generated the event logs. To which technology do the generated logs belong?
Question 362
An engineer received a ticket to investigate a potentially malicious file detected by a malware scanner that was trying to execute multiple commands. During the initial review, the engineer discovered that the file was created two days prior. Further analyses show that the file was downloaded from a known malicious domain after a successful phishing attempt on an asset owner. At which phase of the Cyber Kill Chain was this attack mitigated?
Question 363
Which management concept best describes developing, operating, maintaining, upgrading, and disposing of all resources?
Question 364
Developers must implement tasks on remote Windows environments. They decided to use scripts for enterprise applications through PowerShell. Why does the functionality not work?
Question 365
A forensic investigator is analyzing a recent breach case. An external USB drive was discovered to be connected and transmitting the data outside of the organization, and the owner of the USB drive could not be identified. Video surveillance shows six people during a two-month period had close contact with the affected asset. How must this type of evidence be categorized?
Question 366
What is a disadvantage of the asymmetric encryption system?
Question 367
Which data capture includes payload and header information?
Question 368
What is the key difference between mandatory access control (MAC) and discretionary access control (DAC)?
Question 369
Which two protocols are used for DDoS amplification attacks? (Choose two.)
Question 370
What is the purpose of a ransomware attack?
Question