Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 4

Questions 31

What is the difference between the rule-based detection when compared to behavioral detection?

Options:
A.

Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.

B.

Rule-Based systems have established patterns that do not change with new data, while behavioral changes.

C.

Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.

D.

Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Cisco 200-201 Premium Access
Questions 32

What is a disadvantage of the asymmetric encryption system?

Options:
A.

It is slow compared to the symmetric encryption system.

B.

Asymmetric encryption is used to transfer the data, and symmetric is used to encrypt small chunks of data.

C.

Asymmetric encryption is an old technique, and symmetric encryption is the newer one.

D.

It is less secure because it uses a single key for encryption.

Questions 33

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

Options:
A.

nmap --top-ports 192.168.1.0/24

B.

nmap –sP 192.168.1.0/24

C.

nmap -sL 192.168.1.0/24

D.

nmap -sV 192.168.1.0/24

Questions 34

200-201 Question 34

Refer to the exhibit. Where is the executable file?

Options:
A.

info

B.

tags

C.

MIME

D.

name

Questions 35

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

Options:
A.

examination

B.

investigation

C.

collection

D.

reporting

Questions 36

An engineer must gather data for monitoring purposes from different network devices. The engineer needs to collect events from the local network and use that information for packet sniffing. The solution must create an exact copy of traffic and provide full fidelity. Which solution should the engineer use?

Options:
A.

NAT

B.

tap

C.

SPAN ports

D.

tunneling

Questions 37

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)

Options:
A.

UDP port to which the traffic is destined

B.

TCP port from which the traffic was sourced

C.

source IP address of the packet

D.

destination IP address of the packet

E.

UDP port from which the traffic is sourced

Questions 38

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?

Options:
A.

companyassets that are threatened

B.

customer assets that are threatened

C.

perpetrators of the attack

D.

victims of the attack

Questions 39

According to CVSS, which condition is required for attack complexity metrics?

Options:
A.

man-in-the-middle attack

B.

attackers altering any file

C.

complete loss of protection

D.

total loss of availability

Questions 40

An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?

Options:
A.

phishing email

B.

sender

C.

HR

D.

receiver