Go Back on 200-201 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

200-201 Practice Test


Page 7 out of 37 Pages

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?


A.

NetScout


B.

tcpdump


C.

SolarWinds


D.

netsh





B.
  

tcpdump



Which security principle is violated by running all processes as root or administrator?


A.

principle of least privilege


B.

role-based access control


C.

separation of duties


D.

trusted computing base





A.
  

principle of least privilege



What are the two characteristics of the full packet captures? (Choose two.)


A.

Identifying network loops and collision domains.


B.

Troubleshooting the cause of security and performance issues.


C.

Reassembling fragmented traffic from raw data.


D.

Detecting common hardware faults and identify faulty assets.


E.

Providing a historical record of a network transaction.





C.
  

Reassembling fragmented traffic from raw data.



E.
  

Providing a historical record of a network transaction.



An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)


A.

signatures


B.

host IP addresses


C.

file size


D.

dropped files


E.

domain namesanalysis report shows that outbound callouts were made post infection.





B.
  

host IP addresses



E.
  

domain namesanalysis report shows that outbound callouts were made post infection.



Refer to the exhibit.

Which event is occurring?


A.

A binary named "submit" is running on VM cuckoo1.


B.

A binary is being submitted to run on VM cuckoo1


C.

A binary on VM cuckoo1 is being submitted for evaluation


D.

A URL is being evaluated to see if it has a malicious binary





C.
  

A binary on VM cuckoo1 is being submitted for evaluation




Page 7 out of 37 Pages
Previous