Cisco 200-201 Practice Test - Questions Answers, Page 8
List of questions
Related questions
How does an attacker observe network traffic exchanged between two users?
port scanning
man-in-the-middle
command injection
denial of service
Which type of data consists of connection level, application-specific records generated from network traffic?
transaction data
location data
statistical data
alert data
An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?
ransomware communicating after infection
users downloading copyrighted content
data exfiltration
user circumvention of the firewall
What is an example of social engineering attacks?
receiving an unexpected email from an unknown person with an attachment from someone in the same company
receiving an email from human resources requesting a visit to their secure website to update contact information
sending a verbal request to an administrator who knows how to change an account password
receiving an invitation to the department's weekly WebEx meeting
Refer to the exhibit.
What is occurring in this network?
ARP cache poisoning
DNS cache poisoning
MAC address table overflow
MAC flooding attack
Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?
syslog messages
full packet capture
NetFlow
firewall event logs
A security analyst notices a sudden surge of incoming traffic and detects unknown packets from unknown senders After further investigation, the analyst learns that customers claim that they cannot access company servers According to NIST SP800-61, in which phase of the incident response process is the analyst?
post-incident activity
detection and analysis
preparation
containment, eradication, and recovery
Which vulnerability type is used to read, write, or erase information from a database?
cross-site scripting
cross-site request forgery
buffer overflow
SQL injection
An automotive company provides new types of engines and special brakes for rally sports cars. The company has a database of inventions and patents for their engines and technical information Customers can access the database through the company's website after they register and identify themselves. Which type of protected data is accessed by customers?
IP data
PII data
PSI data
PHI data
According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
malware attack
ransomware attack
whale-phishing
insider threat
Question