Free 200-201 Exam Braindumps (page: 17)

Page 16 of 66

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
What is the impact of this traffic?

  1. ransomware communicating after infection
  2. users downloading copyrighted content
  3. data exfiltration
  4. user circumvention of the firewall

Answer(s): D



What is an example of social engineering attacks?

  1. receiving an unexpected email from an unknown person with an attachment from someone in the same company
  2. receiving an email from human resources requesting a visit to their secure website to update contact information
  3. sending a verbal request to an administrator who knows how to change an account password
  4. receiving an invitation to the department's weekly WebEx meeting

Answer(s): C



Refer to the exhibit.



What is occurring in this network?

  1. ARP cache poisoning
  2. DNS cache poisoning
  3. MAC address table overflow
  4. MAC flooding attack

Answer(s): A



Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

  1. syslog messages
  2. full packet capture
  3. NetFlow
  4. firewall event logs

Answer(s): C






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

200-201 Discussions & Posts