Cisco 200-201 Practice Test - Questions Answers, Page 6
List of questions
Related questions
A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?
reconnaissance
action on objectives
installation
exploitation
What specific type of analysis is assigning values to the scenario to see expected outcomes?
deterministic
exploratory
probabilistic
descriptive
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
fragmentation
pivoting
encryption
stenography
Why is encryption challenging to security monitoring?
Encryption analysis is used by attackers to monitor VPN tunnels.
Encryption is used by threat actors as a method of evasion and obfuscation.
Encryption introduces additional processing requirements by the CPU.
Encryption introduces larger packet sizes to analyze and store.
An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?
The threat actor used a dictionary-based password attack to obtain credentials.
The threat actor gained access to the system by known credentials.
The threat actor used the teardrop technique to confuse and crash login services.
The threat actor used an unknown vulnerability of the operating system that went undetected.
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
company assets that are threatened
customer assets that are threatened
perpetrators of the attack
victims of the attack
What is the relationship between a vulnerability and a threat?
A threat exploits a vulnerability
A vulnerability is a calculation of the potential loss caused by a threat
A vulnerability exploits a threat
A threat is a calculation of the potential loss caused by a vulnerability
What are two social engineering techniques? (Choose two.)
privilege escalation
DDoS attack
phishing
man-in-the-middle
pharming
Refer to the exhibit.
What does the output indicate about the server with the IP address 172.18.104.139?
open ports of a web server
open port of an FTP server
open ports of an email server
running processes of the server
How does certificate authority impact a security system?
It authenticates client identity when requesting SSL certificate
It validates domain identity of a SSL certificate
It authenticates domain identity when requesting SSL certificate
It validates client identity when communicating with the server
Question