Cisco 200-201 Practice Test - Questions Answers, Page 9
List of questions
Related questions
Syslog collecting software is installed on the server For the log containment, a disk with FAT type partition is used An engineer determined that log files are being corrupted when the 4 GB tile size is exceeded. Which action resolves the issue?
Add space to the existing partition and lower the retention penod.
Use FAT32 to exceed the limit of 4 GB.
Use the Ext4 partition because it can hold files up to 16 TB.
Use NTFS partition for log file containment
What ate two categories of DDoS attacks? (Choose two.)
split brain
scanning
phishing
reflected
direct
What is an advantage of symmetric over asymmetric encryption?
A key is generated on demand according to data type.
A one-time encryption key is generated for data transmission
It is suited for transmitting large amounts of data.
It is a faster encryption mechanism for sessions
What are two denial-of-service (DoS) attacks? (Choose two)
port scan
SYN flood
man-in-the-middle
phishing
teardrop
What is the difference between a threat and an exploit?
A threat is a result of utilizing flow in a system, and an exploit is a result of gaining control over the system.
A threat is a potential attack on an asset and an exploit takes advantage of the vulnerability of the asset
An exploit is an attack vector, and a threat is a potential path the attack must go through.
An exploit is an attack path, and a threat represents a potential vulnerability
Which action prevents buffer overflow attacks?
variable randomization
using web based applications
input sanitization
using a Linux operating system
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
known-plaintext
replay
dictionary
man-in-the-middle
Refer to the exhibit.
What should be interpreted from this packet capture?
81.179.179.69 is sending a packet from port 80 to port 50272 of IP address 192.168.122.100 using UDP protocol.
192.168.122.100 is sending a packet from port 50272 to port 80 of IP address 81.179.179.69 using TCP protocol.
192.168.122.100 is sending a packet from port 80 to port 50272 of IP address 81.179.179.69 using UDP protocol.
81.179.179.69 is sending a packet from port 50272 to port 80 of IP address 192.168.122.100 using TCP UDP protocol.
What are the two characteristics of the full packet captures? (Choose two.)
Identifying network loops and collision domains.
Troubleshooting the cause of security and performance issues.
Reassembling fragmented traffic from raw data.
Detecting common hardware faults and identify faulty assets.
Providing a historical record of a network transaction.
Refer to the exhibit.
An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?
The file has an embedded executable and was matched by PEiD threat signatures for further analysis.
The file has an embedded non-Windows executable but no suspicious features are identified.
The file has an embedded Windows 32 executable and the Yara field lists suspicious features for further analysis.
The file was matched by PEiD threat signatures but no suspicious features are identified since the signature list is up to date.
Question