Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 13

Questions 121

What technology should be used for the verified and secure exchange of public keys between entities Tom3350050239 and Dan0932353050?

Options:
A.

Initial Key Sharing

B.

Password-Authenticated Key Exchange

C.

Encrypted Key Exchange

D.

Key Encapsulation Mechanism

Cisco 200-201 Premium Access
Questions 122

Which two protocols are used for DDoS amplification attacks? (Choose two.)

Options:
A.

ICMPv6

B.

DNS

C.

NTP

D.

TCP

E.

HTTP

Questions 123

What is the difference between an attack vector and attack surface?

Options:
A.

An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.

B.

An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.

C.

An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.

D.

An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.

Questions 124

What is data tunneling?

Options:
A.

Encrypted information is returned to its original format.

B.

Data is split into packets and transported to the destination.

C.

Packets are transformed into bytes and assembled by a receiver.

D.

Malicious data is hidden within legitimate system processes.

Questions 125

What is a difference between authorization and authentication from an access control perspective?

Options:
A.

Authorization defines the author of a specific resource and authentication gives access to the resource itself

B.

Authentication is when the system validates if the user is valid, and authorization enforces and provides resources assigned and required.

C.

Authentication is responsible for accounting access on system resources and the authorization process defines if a user is allowed to author the resource

D.

Authorization tracks if a certain user is authenticated within the system, and authentication is responsible for identifying the authorization method

Questions 126

What is session data used for in network security?

Options:
A.

It is the transaction log between monitoring software.

B.

It contains the set of parameters used for fetching logs.

C.

It is the summary of the transmission between two network devices.

D.

It tracks cookies within each session initiated from a user.

Questions 127

Which type of data must an engineer capture to analyze payload and header information?

Options:
A.

frame check sequence

B.

alert data

C.

full packet

D.

session logs

Questions 128

Which SOC metric represents the time to stop the incident from causing further damage to systems or data?

Options:
A.

Mean Time to Acknowledge (MTTA)

B.

Mean Time to Detect (MTTR)

C.

Mean Time to Respond (MTTR)

D.

Mean Time to Contain (MTTC)

Questions 129

Which two measures are used by the defense-m-depth strategy? (Choose two)

Options:
A.

Bridge the single connection into multiple.

B.

Divide the network into parts

C.

Split packets into pieces.

D.

Reduce the load on network devices.

E.

Implement the patch management process

Questions 130

An analyst received a ticket about degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed disabled antivirus software and could not determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

Options:
A.

Detection

B.

Analysis

C.

Eradication

D.

Recovery