Test Online Free Cisco 200-201 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?
Answer:
Question 4Selectable Answer
Why is HTTPS traffic difficult to screen?
Answer:
Question 5Selectable Answer
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
Answer: Explanation:
"EX" = exfiltration
And there are three.
Also the "suspect long flow" and "suspect data heading" suggest, for example, DNS exfiltration
https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/sm
c_users_guide/SW_6_9_0_SMC_Users_Guide_DV_1_2.pdf page 177.
Question 6Selectable Answer
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?
Answer: Explanation:
There are three general types of evidence:
--> Best evidence: can be presented in court in the original form (for example, an exact copy of a hard disk drive).
--> Corroborating evidence: tends to support a theory or an assumption deduced by some initial evidence. This corroborating evidence confirms the proposition.
--> Indirect or circumstantial evidence: extrapolation to a conclusion of fact (such as fingerprints, DNA evidence, and so on).
Question 7Selectable Answer
Which vulnerability type is used to read, write, or erase information from a database?
Answer:
Question 8Selectable Answer
What ate two categories of DDoS attacks? (Choose two.)
Answer:
Question 9Selectable Answer
Refer to the exhibit.
Which two elements in the table are parts of the 5-tuple? (Choose two.)
Answer:
Question 10Selectable Answer
What is the difference between an attack vector and attack surface?
Answer:
Question 11Selectable Answer
Which security technology allows only a set of pre-approved applications to run on a system?
Answer:
Question 12Selectable Answer
Refer to the exhibit.
An engineer is reviewing a Cuckoo report of a file.
What must the engineer interpret from the report?
Answer:
Question 13Selectable Answer
Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?
Answer: Explanation:
Resource exhaustion is a type of denial-of-service attack; however, it can also be used to evade detection by security defenses. A simple definition of resource exhaustion is “consuming the resources necessary to perform an action.” Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Question 14Selectable Answer
Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command.
How must the engineer interpret the results?
Answer:
Question 15Selectable Answer
Which technology on a host is used to isolate a running application from other applications?