This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Thu Nov 21 12:22:49 2024 / +0000 GMT ___________________________________________________ Title: [February-2023]Exam Pass 100%!Braindump2go 200-201 Exam Dumps in PDF 200-201 278Q Instant Download[Q77-Q122] --------------------------------------------------- February/2023 Latest Braindump2go 200-201 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go 200-201 Real Exam Questions!QUESTION 77Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?A. CSIRTB. PSIRTC. public affairsD. managementAnswer: DQUESTION 78An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.What is the impact of this traffic?A. ransomware communicating after infectionB. users downloading copyrighted contentC. data exfiltrationD. user circumvention of the firewallAnswer: DQUESTION 79Which of the following access control models use security labels to make access decisions?A. Mandatory access control (MAC)B. Role-based access control (RBAC)C. Identity-based access control (IBAC)D. Discretionary access control (DAC)Answer: AQUESTION 80What is the main advantage of using a mandatory access control (MAC) model instead of a discretionary access control (DAC) model?A. MAC is more secure because the operating system ensures security policy compliance.B. MAC is more secure because the data owner can decide which user can get access, thus providing more granular access.C. MAC is more secure because permissions are assigned based on roles.D. MAC is better because it is easier to implement.Answer: AQUESTION 81How is attacking a vulnerability categorized?A. action on objectivesB. deliveryC. exploitationD. installationAnswer: CQUESTION 82A system administrator is ensuring that specific registry information is accurate.Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?A. file extension associationsB. hardware, software, and security settings for the systemC. currently logged in users, including folders and control panel settingsD. all users on the system, including visual settingsAnswer: BQUESTION 83What is the difference between statistical detection and rule-based detection models?A. Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of timeB. Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basisC. Statistical detection involves the evaluation of an object on its intended actions before it executes that behaviorD. Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basisAnswer: BQUESTION 84Which step in the incident response process researches an attacking host through logs in a SIEM?A. detection and analysisB. preparationC. eradicationD. containmentAnswer: AQUESTION 85What is the difference between a threat and a risk?A. Threat represents a potential danger that could take advantage of a weakness in a systemB. Risk represents the known and identified loss or danger in the systemC. Risk represents the nonintentional interaction with uncertainty in the systemD. Threat represents a state of being exposed to an attack or a compromise either physically or logicallyAnswer: AQUESTION 86Which signature impacts network traffic by causing legitimate traffic to be blocked?A. false negativeB. true positiveC. true negativeD. false positiveAnswer: DQUESTION 87Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?A. forgery attackB. plaintext-only attackC. ciphertext-only attackD. meet-in-the-middle attackAnswer: CQUESTION 88What is ransomware?A. A type of malware that compromises a system and then often demands a ransom from the victim to pay the attacker in order for the malicious activity to cease or for the malware to be removed from the affected systemB. A set of tools used by an attacker to elevate his privilege to obtain root-level access in order to completely take control of the affected systemC. A type of intrusion prevention systemD. A type of malware that doesn't affect mobile devicesAnswer: AQUESTION 89What two are examples of UDP-based attacks? (Choose two.)A. SYN floodB. SQL slammerC. UDP floodingD. MAC address floodingAnswer: BCQUESTION 90What causes events on a Windows system to show Event Code 4625 in the log messages?A. The system detected an XSS attackB. Someone is trying a brute force attack on the networkC. Another device is gaining root access to the systemD. A privileged user successfully logged into the systemAnswer: BQUESTION 91Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?A. resource exhaustionB. tunnelingC. traffic fragmentationD. timing attackAnswer: AQUESTION 92Refer to the exhibit. What does the message indicate? A. an access attempt was made from the Mosaic web browserB. a successful access attempt was made to retrieve the password fileC. a successful access attempt was made to retrieve the root of the websiteD. a denied access attempt was made to retrieve the password fileAnswer: CQUESTION 93What are two social engineering techniques? (Choose two.)A. privilege escalationB. DDoS attackC. phishingD. man-in-the-middleE. pharmingAnswer: CEQUESTION 94Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139? A. open ports of a web serverB. open port of an FTP serverC. open ports of an email serverD. running processes of the serverAnswer: CQUESTION 95Refer to the exhibit. This request was sent to a web application server driven by a database. Which type of web server attack is represented?A. parameter manipulationB. heap memory corruptionC. command injectionD. blind SQL injectionAnswer: DQUESTION 96What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?A. MAC is controlled by the discretion of the owner and DAC is controlled by an administratorB. MAC is the strictest of all levels of control and DAC is object-based accessC. DAC is controlled by the operating system and MAC is controlled by an administratorD. DAC is the strictest of all levels of control and MAC is object-based accessAnswer: BQUESTION 97A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions.Which identifier tracks an active program?A. application identification numberB. active process identification numberC. runtime identification numberD. process identification numberAnswer: DQUESTION 98A malicious file has been identified in a sandbox analysis tool.Which piece of information is needed to search for additional downloads of this file by other hosts?A. file typeB. file sizeC. file nameD. file hash valueAnswer: DQUESTION 99Which attack method intercepts traffic on a switched network?A. denial of serviceB. ARP cache poisoningC. DHCP snoopingD. command and controlAnswer: BExplanation:In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.QUESTION 100Which two elements are used for profiling a network? (Choose two.)A. session durationB. total throughputC. running processesD. listening portsE. OS fingerprintAnswer: ABExplanation: A network profile should include some important elements, such as the following:Total throughput - the amount of data passing from a given source to a given destination in a given period of timeSession duration - the time between the establishment of a data flow and its terminationPorts used - a list of TCP or UDP processes that are available to accept dataCritical asset address space - the IP addresses or the logical location of essential systems or dataQUESTION 101What does an attacker use to determine which network ports are listening on a potential target device?A. man-in-the-middleB. port scanningC. SQL injectionD. ping sweepAnswer: BQUESTION 102What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?A. MAC spoofingB. IP spoofingC. application spoofingD. name spoofingAnswer: BQUESTION 103What is a purpose of a vulnerability management framework?A. identifies, removes, and mitigates system vulnerabilitiesB. detects and removes vulnerabilities in source codeC. conducts vulnerability scans on the networkD. manages a list of reported vulnerabilitiesAnswer: AQUESTION 104Refer to the exhibit. Which kind of attack method is depicted in this string? A. cross-site scriptingB. man-in-the-middleC. SQL injectionD. denial of serviceAnswer: AQUESTION 105Refer to the exhibit. Which packet contains a file that is extractable within Wireshark? A. 2317B. 1986C. 2318D. 2542Answer: DQUESTION 106How does certificate authority impact a security system?A. It authenticates client identity when requesting SSL certificateB. It validates domain identity of a SSL certificateC. It authenticates domain identity when requesting SSL certificateD. It validates client identity when communicating with the serverAnswer: BQUESTION 107How is NetFlow different than traffic mirroring?A. NetFlow collects metadata and traffic mirroring clones dataB. Traffic mirroring impacts switch performance and NetFlow does notC. Traffic mirroring costs less to operate than NetFlowD. NetFlow generates more data than traffic mirroringAnswer: AQUESTION 108What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?A. least privilegeB. need to knowC. integrity validationD. due diligenceAnswer: AQUESTION 109Which type of data collection requires the largest amount of storage space?A. alert dataB. transaction dataC. session dataD. full packet captureAnswer: DQUESTION 110Which HTTP header field is used in forensics to identify the type of browser used?A. referrerB. hostC. user-agentD. accept-languageAnswer: CQUESTION 111Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard? A. Host 10.201.3.149 is sending data to 152.46.6.91 using TCP/443.B. Host 152.46.6.91 is being identified as a watchlist country for data transfer.C. Traffic to 152.46.6.149 is being denied by an Advanced Network Control policy.D. Host 10.201.3.149 is receiving almost 19 times more data than is being sent to host 152.46.6.91.Answer: DQUESTION 112A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.Which technology should be used to accomplish this task?A. application whitelisting/blacklistingB. network NGFWC. host-based IDSD. antivirus/antispyware softwareAnswer: AQUESTION 113What is the virtual address space for a Windows process?A. physical location of an object in memoryB. set of pages that reside in the physical memoryC. system-level memory protection feature built into the operating systemD. set of virtual memory addresses that can be usedAnswer: DQUESTION 114Refer to the exhibit. What does the message indicate? A. an access attempt was made from the Mosaic web browserB. a successful access attempt was made to retrieve the password fileC. a successful access attempt was made to retrieve the root of the websiteD. a denied access attempt was made to retrieve the password fileAnswer: CQUESTION 115Which access control model does SELinux use?A. RBACB. DACC. MACD. ABACAnswer: CQUESTION 116Which two compliance frameworks require that data be encrypted when it is transmitted over a public network? (Choose two.)A. PCIB. GLBAC. HIPAAD. SOXE. COBITAnswer: ACQUESTION 117Which IETF standard technology is useful to detect and analyze a potential security incident by recording session flows that occurs between hosts?A. SFlowB. NetFlowC. NFlowD. IPFIXAnswer: DQUESTION 118What do the Security Intelligence Events within the FMC allow an administrator to do?A. See if a host is connecting to a known-bad domain.B. Check for host-to-server traffic within your network.C. View any malicious files that a host has downloaded.D. Verify host-to-host traffic within your network.Answer: AQUESTION 119The target web application server is running as the root user and is vulnerable to command injection. Which result of a successful attack is true?A. cross-site scriptingB. cross-site scripting request forgeryC. privilege escalationD. buffer overflowAnswer: BQUESTION 120A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?A. the intellectual property that was stolenB. the defense contractor who stored the intellectual propertyC. the method used to conduct the attackD. the foreign government that conducted the attackAnswer: DQUESTION 121What is the practice of giving an employee access to only the resources needed to accomplish their job?A. principle of least privilegeB. organizational separationC. separation of dutiesD. need to know principleAnswer: AQUESTION 122Which metric is used to capture the level of access needed to launch a successful attack?A. privileges requiredB. user interactionC. attack complexityD. attack vectorAnswer: AResources From:1.2023 Latest Braindump2go 200-201 Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/200-201.html2.2023 Latest Braindump2go 200-201 PDF and 200-201 VCE Dumps Free Share:https://drive.google.com/drive/folders/1fTPALtM-eluHFw8sUjNGF7Y-ofOP3s-M?usp=sharingFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2023-02-14 03:25:24 Post date GMT: 2023-02-14 03:25:24 Post modified date: 2023-02-14 03:25:24 Post modified date GMT: 2023-02-14 03:25:24 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com