Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 3

Questions 21

Which difficulty occurs when log messages are compared from two devices separated by a Layer 3 device that performs Network Address Translation?

Options:
A.

IP addresses in the log messages match

B.

Timestamps of the log messages are different.

C.

Log messages contain incorrect information

D.

IP addresses in the log messages do not match

Cisco 200-201 Premium Access
Questions 22

Which event is user interaction?

Options:
A.

gaining root access

B.

executing remote code

C.

reading and writing file permission

D.

opening a malicious file

Questions 23

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

Options:
A.

X.509 certificates

B.

RADIUS server

C.

CA server

D.

web application firewall

Questions 24

How does TOR alter data content during transit?

Options:
A.

It spoofs the destination and source information protecting both sides.

B.

It encrypts content and destination information over multiple layers.

C.

It redirects destination traffic through multiple sources avoiding traceability.

D.

It traverses source traffic through multiple destinations before reaching the receiver

Questions 25

A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?

Options:
A.

reconnaissance

B.

action on objectives

C.

installation

D.

exploitation

Questions 26

Refer to the exhibit.

200-201 Question 26

An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?

Options:
A.

indirect

B.

circumstantial

C.

corroborative

D.

best

Questions 27

What is a difference between a threat and a risk?

Options:
A.

A threat is a sum of risks and a risk itself represents a specific danger toward the asset

B.

A threat can be people property, or information, and risk is a probability by which these threats may bring harm to the business

C.

A risk is a flaw or hole in security, and a threat is what is being used against that flaw

D.

A risk is an intersection between threat and vulnerabilities, and a threat is what a security engineer is trying to protect against

Questions 28

Refer to the exhibit.

200-201 Question 28

Which tool was used to generate this data?

Options:
A.

NetFlow

B.

dnstools

C.

firewall

D.

tcpdump

Questions 29

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

Options:
A.

Recovery

B.

Detection

C.

Eradication

D.

Analysis

Questions 30

Which security monitoring data type requires the largest storage space?

Options:
A.

transaction data

B.

statistical data

C.

session data

D.

full packet capture