200-201 Practice Test Questions

402 Questions


Which type of data collection requires the largest amount of storage space?


A.

alert data


B.

transaction data


C.

session data


D.

full packet capture





D.
  

full packet capture



Which action prevents buffer overflow attacks?


A.

variable randomization


B.

using web based applications


C.

input sanitization


D.

using a Linux operating system





C.
  

input sanitization



Refer to the exhibit
An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been
downloaded from an email. What is the state of this file?
An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?





C.
  

file has an embedded Windows 32 executable and the Yara field lists suspicious
features for further
analysis.



How does an attacker observe network traffic exchanged between two users?


A.

port scanning


B.

man-in-the-middle


C.

command injection


D.

denial of service





B.
  

man-in-the-middle



What makes HTTPS traffic difficult to monitor?


A.

SSL interception


B.

packet header size


C.

Cs


D.

encryption





D.
  

encryption



Refer to the exhibit.






Which regex matches only on all lowercase letters?


A.

[az]+


B.

[^az]+


C.

az+


D.

a*z+





A.
  

[az]+



Drag and drop the technology on the left onto the data type the technology provides on the right.






At which layer is deep packet inspection investigated on a firewall? 


A.

internet


B.

transport


C.

application


D.

data link





C.
  

application



A security engineer deploys an enterprise-wide host/endpoint technology for all of the
company's corporate PCs. Management requests the engineer to block a selected set of
applications on all PCs.
Which technology should be used to accomplish this task?


A.

application whitelisting/blacklisting


B.

network NGFW


C.

host-based IDS


D.

antivirus/antispyware software





A.
  

application whitelisting/blacklisting



An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?


A.

ransomware communicating after infection


B.

users downloading copyrighted content


C.

data exfiltration


D.

user circumvention of the firewall





D.
  

user circumvention of the firewall



Refer to the exhibit.

What information is depicted?


A.

IIS data


B.

NetFlow data


C.

network discovery event


D.

IPS event data





B.
  

NetFlow data




Page 7 out of 34 Pages
Previous