Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 2

Questions 11

An engineer discovered a breach, identified the threat’s entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?

Options:
A.

Recover from the threat.

B.

Analyze the threat.

C.

Identify lessons learned from the threat.

D.

Reduce the probability of similar threats.

Cisco 200-201 Premium Access
Questions 12

What does an attacker use to determine which network ports are listening on a potential target device?

Options:
A.

man-in-the-middle

B.

port scanning

C.

SQL injection

D.

ping sweep

Questions 13

What matches the regular expression c(rgr)+e?

Options:
A.

crgrrgre

B.

np+e

C.

c(rgr)e

D.

ce

Questions 14

200-201 Question 14

Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.

200-201 Question 14

Options:
Questions 15

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

Options:
A.

forgery attack

B.

plaintext-only attack

C.

ciphertext-only attack

D.

meet-in-the-middle attack

Questions 16

Refer to the exhibit.

200-201 Question 16

Which type of evidence is this file?

Options:
A.

corroborating evidence

B.

circumstantial evidence

C.

best evidence

D.

direct evidence

Questions 17

What is the role of indicator of compromise in an investigation?

Options:
A.

It helps answer the question of why the attack took place.

B.

It identifies potentially malicious activity on a system or network.

C.

It is nonforensic data, which is easy to detect.

D.

It describes what and why something happened.

Questions 18

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

Options:
A.

Hypertext Transfer Protocol

B.

SSL Certificate

C.

Tunneling

D.

VPN

Questions 19

An engineer must verify vulnerabilities found in the scanning process The engineer checks the impact of those findings to the organization and compares the results with known threats inside organization What is the benefit of knowing this information?

Options:
A.

A pcap file can be prepared

B.

An exploit can be built.

C.

Risk can be calculated

D.

Logs can be gathered

Questions 20

Refer to the exhibit.

200-201 Question 20

What does the message indicate?

Options:
A.

an access attempt was made from the Mosaic web browser

B.

a successful access attempt was made to retrieve the password file

C.

a successful access attempt was made to retrieve the root of the website

D.

a denied access attempt was made to retrieve the password file