Cisco 200-201 Practice Test - Questions Answers, Page 4
List of questions
Related questions
What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?
least privilege
need to know
integrity validation
due diligence
What is the virtual address space for a Windows process?
physical location of an object in memory
set of pages that reside in the physical memory
system-level memory protection feature built into the operating system
set of virtual memory addresses that can be used
Which security principle is violated by running all processes as root or administrator?
principle of least privilege
role-based access control
separation of duties
trusted computing base
What is the function of a command and control server?
It enumerates open ports on a network device
It drops secondary payload into malware
It is used to regain control of the network after a compromise
It sends instruction to a compromised system
What is the difference between deep packet inspection and stateful inspection?
Deep packet inspection is more secure than stateful inspection on Layer 4
Stateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7
Stateful inspection is more secure than deep packet inspection on Layer 7
Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4
Which evasion technique is a function of ransomware?
extended sleep calls
encryption
resource exhaustion
encoding
Refer to the exhibit.
Which two elements in the table are parts of the 5-tuple? (Choose two.)
First Packet
Initiator User
Ingress Security Zone
Source Port
Initiator IP
What is the difference between statistical detection and rule-based detection models?
Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior
Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
What is the difference between a threat and a risk?
Threat represents a potential danger that could take advantage of a weakness in a system
Risk represents the known and identified loss or danger in the system
Risk represents the nonintentional interaction with uncertainty in the system
Threat represents a state of being exposed to an attack or a compromise, either physically or logically.
Which attack method intercepts traffic on a switched network?
denial of service
ARP cache poisoning
DHCP snooping
command and control
Question