Go Back on 200-201 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

200-201 Practice Test


Page 3 out of 37 Pages

A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?



A.

 the intellectual property that was stolen


B.

the defense contractor who stored the intellectual property


C.

the method used to conduct the attack


D.

the foreign government that conducted the attack





D.
  

the foreign government that conducted the attack



A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?


A.

the intellectual property that was stolen


B.

the defense contractor who stored the intellectual property


C.

the method used to conduct the attack


D.

the foreign government that conducted the attack





D.
  

the foreign government that conducted the attack



Drag and drop the access control models from the left onto the correct descriptions on the right.






Which security principle requires more than one person is required to perform a critical task?


A.

least privilege


B.

need to know


C.

separation of duties


D.

due diligence





C.
  

separation of duties



Which incidence response step includes identifying all hosts affected by an attack'?


A.

post-incident activity


B.

detection and analysis


C.

containment eradication and recovery


D.

preparation





A.
  

post-incident activity




Page 3 out of 37 Pages
Previous