Free 200-201 Exam Braindumps (page: 19)

Page 18 of 66

Refer to the exhibit.



An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email.
What is the state of this file?

  1. The file has an embedded executable and was matched by PEiD threat signatures for further analysis.
  2. The file has an embedded non-Windows executable but no suspicious features are identified.
  3. The file has an embedded Windows 32 executable and the Yara field lists suspicious features for further analysis.
  4. The file was matched by PEiD threat signatures but no suspicious features are identified since the signature list is up to date.

Answer(s): C



DRAG DROP (Drag and Drop is not supported)

Drag and drop the technology on the left onto the data type the technology provides on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Refer to the exhibit.



What is occurring in this network traffic?

  1. High rate of SYN packets being sent from a multiple source towards a single destination IP.
  2. High rate of ACK packets being sent from a single source IP towards multiple destination IPs.
  3. Flood of ACK packets coming from a single source IP to multiple destination IPs.
  4. Flood of SYN packets coming from a single source IP to a single destination IP.

Answer(s): D



An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow.
Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)

  1. management and reporting
  2. traffic filtering
  3. adaptive AVC
  4. metrics collection and exporting
  5. application recognition

Answer(s): A,E






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

200-201 Discussions & Posts