Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 10

Questions 91

Drag and drop the uses on the left onto the type of security system on the right.

200-201 Question 91

Options:
Cisco 200-201 Premium Access
Questions 92

Which security technology allows only a set of pre-approved applications to run on a system?

Options:
A.

application-level blacklisting

B.

host-based IPS

C.

application-level whitelisting

D.

antivirus

Questions 93

A multinational organization uses a complex network infrastructure incorporating multiple cloud services, diverse endpoints, and distributed networks with several security devices. Which challenge will the security team face when ensuring robust data visibility for effective threat detection and response?

Options:
A.

inconsistent data aggregation from different technologies used within the organization

B.

different protocols used through different technologies across the organization

C.

duplicate logs and alerts from different platforms

D.

limited data retention policies across different platforms

Questions 94

What are two differences between tampered disk images and untampered disk images'? (Choose two.)

Options:
A.

Tampered Images are used in a security investigation process

B.

Untampered images can be used as law enforcement evidence.

C.

The image is untampered if the existing stored hash matches the computed one

D.

The image is tampered if the stored hash and the computed hash are identical

E.

Tampered images are used as an element for the root cause analysis report

Questions 95

Which regex matches only on all lowercase letters?

Options:
A.

[a−z]+

B.

[^a−z]+

C.

a−z+

D.

a*z+

Questions 96

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.

200-201 Question 96

Options:
Questions 97

Which type of access control depends on the job function of the user?

Options:
A.

discretionary access control

B.

nondiscretionary access control

C.

role-based access control

D.

rule-based access control

Questions 98

Refer to the exhibit.

200-201 Question 98

An analyst was given a PCAP file, which is associated with a recent intrusion event in the company FTP server Which display filters should the analyst use to filter the FTP traffic?

Options:
A.

dstport == FTP

B.

tcp.port==21

C.

tcpport = FTP

D.

dstport = 21

Questions 99

Refer to the exhibit.

200-201 Question 99

During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?

Options:
A.

antivirus

B.

proxy

C.

IDS/IPS

D.

firewall

Questions 100

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?

Options:
A.

ransomware communicating after infection

B.

users downloading copyrighted content

C.

data exfiltration

D.

user circumvention of the firewall