Free 200-201 Exam Braindumps (page: 25)

Page 24 of 66

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.

Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

  1. signatures
  2. host IP addresses
  3. file size
  4. dropped files
  5. domain names

Answer(s): B,E



An analyst is exploring the functionality of different operating systems.

What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

  1. queries Linux devices that have Microsoft Services for Linux installed
  2. deploys Windows Operating Systems in an automated fashion
  3. is an efficient tool for working with Active Directory
  4. has a Common Information Model, which describes installed hardware and software

Answer(s): D



What causes events on a Windows system to show Event Code 4625 in the log messages?

  1. The system detected an XSS attack
  2. Someone is trying a brute force attack on the network
  3. Another device is gaining root access to the system
  4. A privileged user successfully logged into the system

Answer(s): B



Refer to the exhibit.



What does the message indicate?

  1. an access attempt was made from the Mosaic web browser
  2. a successful access attempt was made to retrieve the password file
  3. a successful access attempt was made to retrieve the root of the website
  4. a denied access attempt was made to retrieve the password file

Answer(s): C






Post your Comments and Discuss Cisco® 200-201 exam with other Community members:

200-201 Discussions & Posts