200-201 Dumps

200-201 Free Practice Test

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals

QUESTION 51

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

Correct Answer: C

QUESTION 52

Which security technology allows only a set of pre-approved applications to run on a system?

Correct Answer: C

QUESTION 53

Which regular expression is needed to capture the IP address 192.168.20.232?

Correct Answer: A

QUESTION 54

Refer to the exhibit.
200-201 dumps exhibit
An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?

Correct Answer: C
Indirect=circumstantail so there is no posibility to match A or B (only one answer is needed in this question). For suer it's not a BEST evidence - this FW data inform only of DROPPED traffic. If smth happend inside network, presented evidence could be used to support other evidences or make our narreation stronger but alone it's mean nothing.

QUESTION 55

In a SOC environment, what is a vulnerability management metric?

Correct Answer: C