200-201 Practice Test Questions

402 Questions


Which regular expression matches "color" and "colour"?


A.

colo?ur


B.

col[08]+our


C.

colou?r


D.

col[09]+our





C.
  

colou?r



Which event is user interaction?


A.

gaining root access


B.

executing remote code


C.

reading and writing file permission


D.

opening a malicious file





D.
  

opening a malicious file



How does certificate authority impact a security system?


A.

It authenticates client identity when requesting SSL certificate


B.

It validates domain identity of a SSL certificate


C.

It authenticates domain identity when requesting SSL certificate


D.

It validates client identity when communicating with the server





B.
  

It validates domain identity of a SSL certificate



What is a benefit of agent-based protection when compared to agentless protection?


A.

It lowers maintenance costs


B.

It provides a centralized platform


C.

It collects and detects all traffic locally


D.

It manages numerous devices simultaneously





B.
  

It provides a centralized platform



A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?


A.

CD data copy prepared in Windows


B.

CD data copy prepared in Mac-based system


C.

CD data copy prepared in Linux system


D.

CD data copy prepared in Android-based system





A.
  

CD data copy prepared in Windows



What is an example of social engineering attacks?


A.

A. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company


B.

receiving an email from human resources requesting a visit to their secure website to update contact information


C.

sending a verbal request to an administrator who knows how to change an account password


D.

receiving an invitation to the department’s weekly WebEx meeting





B.
  

receiving an email from human resources requesting a visit to their secure website to update contact information



Which utility blocks a host portscan?


A.

HIDS


B.

sandboxing


C.

host-based firewall


D.

antimalware





C.
  

host-based firewall



During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?


A.

examination


B.

investigation


C.

collection


D.

reporting





C.
  

collection



What is the difference between a threat and a risk?


A.

Threat represents a potential danger that could take advantage of a weakness in a system


B.

Risk represents the known and identified loss or danger in the system


C.

Risk represents the nonintentional interaction with uncertainty in the system


D.

Threat represents a state of being exposed to an attack or a compromise either
physically or logically





A.
  

Threat represents a potential danger that could take advantage of a weakness in a system



A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?


A.

file extension associations


B.

hardware, software, and security settings for the system


C.

currently logged in users, including folders and control panel settings


D.

all users on the system, including visual settings





B.
  

hardware, software, and security settings for the system



Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?


A.

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods


B.

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested
compression methods


C.

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested
compression methods


D.

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods





C.
  

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested
compression methods



Which evasion technique is a function of ransomware?


A.

extended sleep calls


B.

encryption


C.

resource exhaustion


D.

encoding





B.
  

encryption




Page 9 out of 34 Pages
Previous