Free 200-201 Exam Braindumps (page: 11)

Page 10 of 66

What is the relationship between a vulnerability and a threat?

  1. A threat exploits a vulnerability
  2. A vulnerability is a calculation of the potential loss caused by a threat
  3. A vulnerability exploits a threat
  4. A threat is a calculation of the potential loss caused by a vulnerability

Answer(s): A



What is the principle of defense-in-depth?

  1. Agentless and agent-based protection for security are used.
  2. Several distinct protective layers are involved.
  3. Access control models are involved.
  4. Authentication, authorization, and accounting mechanisms are used.

Answer(s): B



DRAG DROP (Drag and Drop is not supported) (Drag and Drop is not supported)

Drag and drop the uses on the left onto the type of security system on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



What is the difference between the rule-based detection when compared to behavioral detection?

  1. Rule-Based detection is searching for patterns linked to specific types of attacks, while behavioral is identifying per signature.
  2. Rule-Based systems have established patterns that do not change with new data, while behavioral changes.
  3. Behavioral systems are predefined patterns from hundreds of users, while Rule-Based only flags potentially abnormal patterns using signatures.
  4. Behavioral systems find sequences that match a particular attack signature, while Rule-Based identifies potential attacks.

Answer(s): D






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

200-201 Discussions & Posts