Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 12

Questions 111

Which security principle requires more than one person is required to perform a critical task?

Options:
A.

least privilege

B.

need to know

C.

separation of duties

D.

due diligence

Cisco 200-201 Premium Access
Questions 112

An employee of a company receives an email with an attachment. They notice that this email is from a suspicious source, and they decide not to open the attached file. After further investigation, a security analyst concludes that this file is malware. To which category of the Cyber Kill Chain model does this event belong?

Options:
A.

Weaponization

B.

Installation

C.

Exploitation

D.

Delivery

Questions 113

Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)

Options:
A.

detection and analysis

B.

post-incident activity

C.

vulnerability scoring

D.

vulnerability management

E.

risk assessment

Questions 114

An engineer is addressing a connectivity issue between two servers where the remote server is unable to establish a successful session. Initial checks show that the remote server is not receiving an SYN-ACK while establishing a session by sending the first SYN. What is causing this issue?

Options:
A.

incorrect TCP handshake

B.

incorrect UDP handshake

C.

incorrect OSI configuration

D.

incorrect snaplen configuration

Questions 115

How is attacking a vulnerability categorized?

Options:
A.

action on objectives

B.

delivery

C.

exploitation

D.

installation

Questions 116

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

Options:
A.

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

B.

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods

C.

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods

D.

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

Questions 117

What describes the difference when comparing attack surface and vulnerability in practice?

Options:
A.

Updating the OS reduces the attack surface, and installing separate optional patches remediates and solves vulnerabilities within the system.

B.

Patching SMB vulnerability is an attack surface reduction, and the open unused ports are the vulnerabilities within the system.

C.

A SMB server that can allow remote code execution is a vulnerability, and closing port 139 is an attack surface reduction.

D.

The attack surface is the SQL injection targeted on the database, and the database tables are the vulnerabilities that might be exploited.

Questions 118

Drag and drop the data sources from the left onto the corresponding data types on the right.

200-201 Question 118

Options:
Questions 119

What is a benefit of using asymmetric cryptography?

Options:
A.

decrypts data with one key

B.

fast data transfer

C.

secure data transfer

D.

encrypts data with one key

Questions 120

An organization recently experienced a major incident in which servers were attacked and data integrity was compromised. The attacker exploited a vulnerability in TLS 1.2 and performed a man-in-the-middle attack by downgrading the connection. Which action should a security specialist take to prevent similar attacks in the future?

Options:
A.

Upgrade to TLS 1.3 or a higher version

B.

Deploy a network monitoring solution

C.

Update IIS server versions

D.

Install a lower version of TLS such as 1.1