Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 14

Questions 131

What is the difference between the ACK flag and the RST flag in the NetFlow log session?

Options:
A.

The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete

B.

The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete

C.

The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection

D.

The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection

Cisco 200-201 Premium Access
Questions 132

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?

Options:
A.

reconnaissance

B.

delivery

C.

weaponization

D.

exploitation

Questions 133

A CMS plugin creates two files that are accessible from the Internet myplugin html and exploitable php A newly discovered exploit takes advantage of an injection vulnerability m exploitable php To exploit the vulnerability an HTTP POST must be sent with specific variables to exploitable php A security engineer notices traffic to the webserver that consists of only HTTP GET requests to myplugin html Which category does this activity fall under?

Options:
A.

weaponization

B.

installation

C.

reconnaissance

D.

exploitation

Questions 134

What does cyber attribution identify in an investigation?

Options:
A.

cause of an attack

B.

exploit of an attack

C.

vulnerabilities exploited

D.

threat actors of an attack

Questions 135

What are two differences and benefits of packet filtering, stateful firewalling, and deep packet inspections? (Choose two.)

Options:
A.

Packet filtering is capable of UDP state monitoring only, and stateful inspection can provide monitoring of TCP sessions.

B.

Deep packet inspection is capable of malware blocking, and packet filtering is not.

C.

Stateful inspection is capable of packet data inspections, and deep packet inspection is not.

D.

Deep packet inspection operates up to Layer 7, and packet filtering operates on Layer 3 and 4 of OSI model.

E.

Stateful inspection is capable of TCP state tracking, and deep packet inspection checks only TCP source and destination ports.

Questions 136

Which evasion technique is a function of ransomware?

Options:
A.

extended sleep calls

B.

encryption

C.

resource exhaustion

D.

encoding

Questions 137

What is the impact of false positive alerts on business compared to true positive?

Options:
A.

True positives affect security as no alarm is raised when an attack has taken place, while false positives are alerts raised appropriately to detect and further mitigate them.

B.

True-positive alerts are blocked by mistake as potential attacks, while False-positives are actual attacks Identified as harmless.

C.

False-positive alerts are detected by confusion as potential attacks, while true positives are attack attempts identified appropriately.

D.

False positives alerts are manually ignored signatures to avoid warnings that are already acknowledged, while true positives are warnings that are not yet acknowledged.

Questions 138

An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

Options:
A.

management and reporting

B.

traffic filtering

C.

adaptive AVC

D.

metrics collection and exporting

E.

application recognition

Questions 139

Refer to the exhibit.

200-201 Question 139

An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?

Options:
A.

The file has an embedded executable and was matched by PEiD threat signatures for further analysis.

B.

The file has an embedded non-Windows executable but no suspicious features are identified.

C.

The file has an embedded Windows 32 executable and the Yara field lists suspicious features for further analysis.

D.

The file was matched by PEiD threat signatures but no suspicious features are identified since the signature list is up to date.

Questions 140

Which technology prevents end-device to end-device IP traceability?

Options:
A.

encryption

B.

load balancing

C.

NAT/PAT

D.

tunneling