Win IT Exam with Last Dumps 2024


Cisco 200-201 Exam

Page 6/24
Viewing Questions 51 60 out of 231 Questions
25.00%

Question 51
Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?
A. forgery attack
B. plaintext-only attack
C. ciphertext-only attack
D. meet-in-the-middle attack

Question 52
Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?
A. ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods
B. ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods
C. ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods
D. ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

Question 53
Refer to the exhibit. Which type of log is displayed?
Image 200-201_53Q.png related to the Cisco 200-201 Exam
A. IDS
B. proxy
C. NetFlow
D. sys

Question 54
Refer to the exhibit. What information is depicted?
Image 200-201_54Q.png related to the Cisco 200-201 Exam
A. IIS data
B. NetFlow data
C. network discovery event
D. IPS event data

Question 55
What is the difference between the ACK flag and the RST flag in the NetFlow log session?
A. The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete
B. The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete
C. The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection
D. The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection


Question 56
Refer to the exhibit. Which type of log is displayed?
Image 200-201_56Q.png related to the Cisco 200-201 Exam
A. proxy
B. NetFlow
C. IDS
D. sys

Question 57
How is NetFlow different from traffic mirroring?
A. NetFlow collects metadata and traffic mirroring clones data.
B. Traffic mirroring impacts switch performance and NetFlow does not.
C. Traffic mirroring costs less to operate than NetFlow.
D. NetFlow generates more data than traffic mirroring.

Question 58
What makes HTTPS traffic difficult to monitor?
A. SSL interception
B. packet header size
C. signature detection time
D. encryption

Question 59
How does an attacker observe network traffic exchanged between two users?
A. port scanning
B. man-in-the-middle
C. command injection
D. denial of service

Question 60
Which type of data consists of connection level, application-specific records generated from network traffic?
A. transaction data
B. location data
C. statistical data
D. alert data