200-201 Dumps

200-201 Free Practice Test

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals

QUESTION 16

Which system monitors local system operation and local network access for violations of a security policy?

Correct Answer: A
HIDS is capable of monitoring the internals of a computing system as well as the network packets on its network interfaces. Host-based firewall is a piece of software running on a single Host that can restrict incoming and outgoing Network activity for that host only.

QUESTION 17

What is a benefit of using asymmetric cryptography?

Correct Answer: C

QUESTION 18

Which piece of information is needed for attribution in an investigation?

Correct Answer: C
Actually this is the most important thing: know who, what, how, why, etc.. attack the network.

QUESTION 19

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.
Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

Correct Answer: BE

QUESTION 20

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?

Correct Answer: B