Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 8

Questions 71

According to CVSS, what is attack complexity?

Options:
A.

existing exploits available in the wild exploiting the vulnerability

B.

existing circumstances beyond the attacker's control to exploit the vulnerability

C.

number of actions an attacker should perform to exploit the vulnerability

D.

number of patches available for certain attack mitigation and how complex the workarounds are

Cisco 200-201 Premium Access
Questions 72

Which data capture includes payload and header information?

Options:
A.

frame check sequence

B.

full packet

C.

alert data

D.

session logs

Questions 73

What is the difference between statistical detection and rule-based detection models?

Options:
A.

Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time

B.

Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis

C.

Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior

D.

Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

Questions 74

What is the name of the technology that searches for and reports on known weaknesses and flaws present in an organization’s IT infrastructure?

Options:
A.

vulnerability scanner

B.

identity and access management

C.

configuration management

D.

mobile device management

Questions 75

Which items is an end-point application greylist used?

Options:
A.

Items that have been established as malicious

B.

Items that have been established as authorized

C.

Items that have been installed with a baseline

D.

Items before being established as harmful or malicious

Questions 76

What is a difference between rule-based and role-based access control mechanisms?

Options:
A.

Rule-based are simple and easy to execute, and role-based are well-defined.

B.

Role-based are an appropriate choice in geographically diverse workgroups, and rule-based are for simply structured workgroups.

C.

Rule-based are less granular, and role-based have time constraints.

D.

Role-based are efficient in small workgroups, and rule-based are preferred in time-defined workgroups.

Questions 77

What is used to maintain persistent control of an exploited device?

Options:
A.

rootkit

B.

ARP spoof

C.

DDoS

D.

encryption

Questions 78

Which CVSS metric group identifies other components that are affected by a successful security attack?

Options:
A.

scope

B.

attack vector

C.

integrity

D.

privileges required

Questions 79

What specific type of analysis is assigning values to the scenario to see expected outcomes?

Options:
A.

deterministic

B.

exploratory

C.

probabilistic

D.

descriptive

Questions 80

200-201 Question 80

Refer to the exhibit. A SOC analyst is examining the Windows security logs of one of the endpoints. What is the possible reason for this event log?

Options:
A.

Brute force attack

B.

Windows failed to audit logs

C.

Malware Attack

D.

System maintenance logs