200-201 Dumps

200-201 Free Practice Test

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals

QUESTION 6

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data The engineer could not find an external USB device Which piece of information must an engineer use for attribution in an investigation?

Correct Answer: C

QUESTION 7

Refer to the exhibit.
200-201 dumps exhibit
An engineer is analyzing a PCAP file after a recent breach An engineer identified that the attacker used an aggressive ARP scan to scan the hosts and found web and SSH servers. Further analysis showed several SSH Server Banner and Key Exchange Initiations. The engineer cannot see the exact data being transmitted over an encrypted channel and cannot identify how the attacker gained access How did the attacker gain access?

Correct Answer: C

QUESTION 8

Refer to the exhibit.
200-201 dumps exhibit
In which Linux log file is this output found?

Correct Answer: D

QUESTION 9

Refer to the exhibit.
200-201 dumps exhibit
A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded What would have occurred with stronger data visibility?

Correct Answer: B

QUESTION 10

What specific type of analysis is assigning values to the scenario to see expected outcomes?

Correct Answer: A