Cisco 200-201 Practice Test - Questions Answers, Page 5
List of questions
Related questions
What does an attacker use to determine which network ports are listening on a potential target device?
man-in-the-middle
port scanning
SQL injection
ping sweep
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Untampered images are used in the security investigation process
Tampered images are used in the security investigation process
The image is tampered if the stored hash and the computed hash match
Tampered images are used in the incident recovery process
The image is untampered if the stored hash and the computed hash match
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
examination
investigation
collection
reporting
Which step in the incident response process researches an attacking host through logs in a SIEM?
detection and analysis
preparation
eradication
containment
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?
file header type
file size
file name
file hash value
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.
Host 152.46.6.91 is being identified as a watchlist country for data transfer.
Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.
Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
A policy violation is active for host 10.10.101.24.
A host on the network is sending a DDoS attack to another inside host.
There are two active data exfiltration alerts.
A policy violation is active for host 10.201.3.149.
Which security technology allows only a set of pre-approved applications to run on a system?
application-level blacklisting
host-based IPS
application-level whitelisting
antivirus
An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?
data from a CD copied using Mac-based system
data from a CD copied using Linux system
data from a DVD copied using Windows system
data from a CD copied using Windows
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
integrity
confidentiality
availability
scope
Question