Go Back on 200-201 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

200-201 Practice Test


Page 1 out of 37 Pages

What is rule-based detection when compared to statistical detection?


A.

proof of a user's identity


B.

proof of a user's action


C.

likelihood of user's action


D.

Dfalsification of a user's identity





B.
  

proof of a user's action



Which two elements are used for profiling a network? (Choose two.)


A.

session duration


B.

total throughput


C.

running processes


D.

 listening ports


E.

EOS fingerprint





D.
  

 listening ports



E.
  

EOS fingerprint



Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?


A.

resource exhaustion


B.

tunneling


C.

traffic fragmentation


D.

timing attack





A.
  

resource exhaustion



E.
  

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?


A.

forgery attack


B.

plaintext-only attack


C.

ciphertext-only attack


D.

meet-in-the-middle attack





C.
  

ciphertext-only attack



What does cyber attribution identify in an investigation?


A.

exploit of an attack


B.

 threat actors of an attack


C.

vulnerabilities exploited


D.

cause of an attack





B.
  

 threat actors of an attack




Page 1 out of 37 Pages