Test Online Free Cisco 200-201 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 200-201 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information.
What is the threat actor in this incident?
Answer:
Question 47Selectable Answer
Which security monitoring data type requires the largest storage space?
Answer:
Question 48Selectable Answer
A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property.
What is the threat agent in this situation?
Answer:
Question 49Written Answer
DRAG DROP
Drag and drop the event term from the left onto the description on the right.
Answer:
Question 50Selectable Answer
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
Answer:
Question 51Selectable Answer
Refer to the exhibit.
What should be interpreted from this packet capture?
Answer:
Question 52Selectable Answer
Which attack method intercepts traffic on a switched network?
Answer: Explanation:
An ARP-based MITM attack is achieved when an attacker poisons the ARP cache of two devices with the MAC address of the attacker's network interface card (NIC). Once the ARP caches have been successfully poisoned, each victim device sends all its packets to the attacker when communicating to the other device and puts the attacker in the middle of the communications path between the two victim devices. It allows an attacker to easily monitor all communication between victim devices. The intent is to intercept and view the information being passed between the two victim devices and potentially introduce sessions and traffic between the two victim devices
Question 53Selectable Answer
What are two denial-of-service (DoS) attacks? (Choose two)