Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-201 Practice Exam with Questions & Answers | Set: 9

Questions 81

How can TOR impact data visibility inside an organization?

Options:
A.

increases data integrity

B.

increases security

C.

decreases visibility

D.

no impact

Cisco 200-201 Premium Access
Questions 82

Refer to the exhibit.

200-201 Question 82

A security analyst wraps up the shift and passed open ticket notes to the night shift SOC team analyst. The ticket name in question is "Investigating suspicious activity on a Windows Server’’. Which operating system components must the analyst prioritize to uncover the attacker's persistence mechanisms?

Options:
A.

Review the Windows Defender setup and failed login attempts in Event Viewer

B.

Investigate the Task Scheduler entries and Windows Defender settings.

C.

Analyze the Windows Registry changes and Task Scheduler tasks.

D.

Focus on the user account log-ins and delete newly added Run keys in the registry

Questions 83

Which tool gives the ability to see session data in real time?

Options:
A.

tcpdstat

B.

trafdump

C.

tcptrace

D.

trafshow

Questions 84

An analyst is using the SIEM platform and must extract a custom property from a Cisco device and capture the phrase, "File: Clean." Which regex must the analyst import?

Options:
A.

File: Clean

B.

^Parent File Clean$

C.

File: Clean (.*)

D.

^File: Clean$

Questions 85

Which process is used when IPS events are removed to improve data integrity?

Options:
A.

data availability

B.

data normalization

C.

data signature

D.

data protection

Questions 86

Which two elements are used by the defense-in-depth strategy? (Choose two)

Options:
A.

packet segmentation

B.

least privilege principle

C.

single unified security solution

D.

distributed database management system

E.

firewalls

Questions 87

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.

Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

Options:
A.

signatures

B.

host IP addresses

C.

file size

D.

dropped files

E.

domain names

Questions 88

What is the purpose of a host-based intrusion detection system (HIDS)?

Options:
A.

A HIDS protects against threats via known denylisted hash databases of malware and ransomware.

B.

A HIDS filters traffic according to configured firewall access control rules.

C.

A HIDS detects threats using a combination of signature-based and anomaly-based detection methods.

D.

A HIDS blocks potential anomalous user activity.

Questions 89

Refer to the exhibit.

200-201 Question 89

An attacker gained initial access to the company s network and ran an Nmap scan to advance with the lateral movement technique and to search the sensitive data Which two elements can an attacker identify from the scan? (Choose two.)

Options:
A.

workload and the configuration details

B.

user accounts and SID

C.

number of users and requests that the server is handling

D.

functionality and purpose of the server

E.

running services

Questions 90

What is the communication channel established from a compromised machine back to the attacker?

Options:
A.

man-in-the-middle

B.

IDS evasion

C.

command and control

D.

port scanning