Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers

Questions 1

Which action matches the weaponization step of the Cyber Kill Chain model?

Options:
A.

Scan a host to find open ports and vulnerabilities

B.

Construct the appropriate malware and deliver it to the victim.

C.

Test and construct the appropriate malware to launch the attack

D.

Research data on a specific vulnerability

Cisco 200-201 Premium Access
Questions 2

Refer to the exhibit.

200-201 Question 2

Which application protocol is in this PCAP file?

Options:
A.

SSH

B.

TCP

C.

TLS

D.

HTTP

Questions 3

An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?

Options:
A.

data from a CD copied using Mac-based system

B.

data from a CD copied using Linux system

C.

data from a DVD copied using Windows system

D.

data from a CD copied using Windows

Questions 4

At which layer is deep packet inspection investigated on a firewall?

Options:
A.

internet

B.

transport

C.

application

D.

data link

Questions 5

Which step in the incident response process researches an attacking host through logs in a SIEM?

Options:
A.

detection and analysis

B.

preparation

C.

eradication

D.

containment

Questions 6

How is symmetric encryption used for HTTPS connections?

Options:
A.

The symmetric encryption algorithm uses public-private certificates

B.

Encryption is based on RSA-2048

C.

The symmetric key is used for encryption

D.

The key exchange process is reliable and secure

Questions 7

A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?

Options:
A.

application identification number

B.

active process identification number

C.

runtime identification number

D.

process identification number

Questions 8

200-201 Question 8

Refer to the exhibit. A security analyst examines Apache web server logs and notices the entries. Which security concern is occurring?

Options:
A.

Someone is attempting to exploit a vulnerability in XMLRPC functionality

B.

An attacker potentially gained shell access to the web server

C.

The web server is experiencing a denial-of-service attack

D.

A brute-force attack is being attempted against common administrative login pages

Questions 9

What is data encapsulation?

Options:
A.

Browsing history is erased automatically with every session.

B.

The protocol of the sending host adds additional data to the packet header.

C.

Data is encrypted backwards, which makes it unusable.

D.

Multiple hosts can be supported with only a few public IP addresses.

Questions 10

Refer to the exhibit.

200-201 Question 10

Which application-level protocol is being targeted?

Options:
A.

HTTPS

B.

FTP

C.

HTTP

D.

TCP