Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 6

Questions 51

What is an example of social engineering attacks?

Options:
A.

receiving an unexpected email from an unknown person with an attachment from someone in the same company

B.

receiving an email from human resources requesting a visit to their secure website to update contact information

C.

sending a verbal request to an administrator who knows how to change an account password

D.

receiving an invitation to the department’s weekly WebEx meeting

Cisco 200-201 Premium Access
Questions 52

Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?

Options:
A.

Display

B.

Man-in-the-middle

C.

Distributed denial of service

D.

Denial of service

Questions 53

When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?

Options:
A.

full packet capture

B.

NetFlow data

C.

session data

D.

firewall logs

Questions 54

Which signature impacts network traffic by causing legitimate traffic to be blocked?

Options:
A.

false negative

B.

true positive

C.

true negative

D.

false positive

Questions 55

Refer to the exhibit.

200-201 Question 55

What does the output indicate about the server with the IP address 172.18.104.139?

Options:
A.

open ports of a web server

B.

open port of an FTP server

C.

open ports of an email server

D.

running processes of the server

Questions 56

A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does to this type of event belong?

Options:
A.

weaponization

B.

delivery

C.

exploitation

D.

reconnaissance

Questions 57

Drag and drop the security concept from the left onto the example of that concept on the right.

200-201 Question 57

Options:
Questions 58

Refer to the exhibit.

200-201 Question 58

Which type of attack is being executed?

Options:
A.

SQL injection

B.

cross-site scripting

C.

cross-site request forgery

D.

command injection

Questions 59

Refer to the exhibit.

200-201 Question 59

What is the outcome of the command?

Options:
A.

TCP rule that detects TCP packets with the SYN flag in an external FTP server

B.

TCP rule that detects TCP packets with a SYN flag in the internal network

C.

TCP rule that detects TCP packets with a ACK flag in the internal network

D.

TCP rule that detects TCP packets with the ACK flag in an external FTP server

Questions 60

Refer to the exhibit.

200-201 Question 60

A company employee is connecting to mail google.com from an endpoint device. The website is loaded but with an error. What is occurring?

Options:
A.

DNS hijacking attack

B.

Endpoint local time is invalid.

C.

Certificate is not in trusted roots.

D.

man-m-the-middle attack