200-201 Dumps

200-201 Free Practice Test

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals

QUESTION 106

What is threat hunting?

Correct Answer: B

QUESTION 107

What is the difference between vulnerability and risk?

Correct Answer: C

QUESTION 108

Which HTTP header field is used in forensics to identify the type of browser used?

Correct Answer: C
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20100101 Firefox/12.0 In computing, a user agent is any software, acting on behalf of a user, which "retrieves, renders and facilitates end-user interaction with Web content".[1] A user agent is therefore a special kind of software agent. https://en.wikipedia.org/wiki/User_agent#User_agent_identification
A user agent is a computer program representing a person, for example, a browser in a Web context. https://developer.mozilla.org/en-US/docs/Glossary/User_agent

QUESTION 109

What is a difference between tampered and untampered disk images?

Correct Answer: D
The disk image must be intact for forensics analysis. As a cybersecurity professional, you may be given the task of capturing an image of a disk in a forensic manner. Imagine a security incident has occurred on a system and you are required to perform some forensic investigation to determine who and what caused the attack. Additionally, you want to ensure the data that was captured is not tampered with or modified during the creation of a disk image process. Ref: Cisco Certified CyberOps Associate 200-201 Certification Guide

QUESTION 110

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

Correct Answer: D