Win IT Exam with Last Dumps 2023


Cisco 200-201 Exam

Page 14/24
Viewing Questions 131 140 out of 231 Questions
58.33%

Question 131
Refer to the exhibit. Which technology generates this log?
Image 200-201_131Q.png related to the Cisco 200-201 Exam
A. NetFlow
B. IDS
C. web proxy
D. firewall

Question 132
Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
A. src=10.11.0.0/16 and dst=10.11.0.0/16
B. ip.src==10.11.0.0/16 and ip.dst==10.11.0.0/16
C. ip.src=10.11.0.0/16 and ip.dst=10.11.0.0/16
D. src==10.11.0.0/16 and dst==10.11.0.0/16

Question 133
Which tool provides a full packet capture from network traffic?
A. Nagios
B. CAINE
C. Hydra
D. Wireshark

Question 134
A company is using several network applications that require high availability and responsiveness, such that milliseconds of latency on network traffic is not acceptable. An engineer needs to analyze the network and identify ways to improve traffic movement to minimize delays. Which information must the engineer obtain for this analysis?
A. total throughput on the interface of the router and NetFlow records
B. output of routing protocol authentication failures and ports used
C. running processes on the applications and their total network usage
D. deep packet captures of each application flow and duration

Question 135
Refer to the exhibit. What is depicted in the exhibit?
Image 200-201_135Q.png related to the Cisco 200-201 Exam
A. Windows Event logs
B. Apache logs
C. IIS logs
D. UNIX-based syslog


Question 136
Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?
A. AWS
B. IIS
C. Load balancer
D. Proxy server

Question 137
Which regular expression matches "color" and "colour"?
A. colo?ur
B. col[08]+our
C. colou?r
D. col[09]+our

Question 138
Which artifact is used to uniquely identify a detected file?
A. file timestamp
B. file extension
C. file size
D. file hash

Question 139
A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?
A. application whitelisting/blacklisting
B. network NGFW
C. host-based IDS
D. antivirus/antispyware software

Question 140
Which utility blocks a host portscan?
A. HIDS
B. sandboxing
C. host-based firewall
D. antimalware



Premium Version