[Sep-2020]Exam Pass 100%!Braindump2go 200-201 PDF and VCE Dumps 200-201 113Q Instant Download[Q40-Q60]

2020/Sep Latest Braindump2go 200-201 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 200-201 Real Exam Questions!

QUESTION 40
Which type of data typically consists of connection level, application-specific records generated from network traffic?

A. location data
B. statistical data
C. alert data
D. transaction data

Answer: B

QUESTION 41
What are three key components of a threat-centric SOC? (Choose three.)

A. people
B. compliances
C. processes
D. regulations
E. technologies

Answer: ACE

QUESTION 42
An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?

A. sequence numbers
B. IP identifier
C. 5-tuple
D. timestamps

Answer: C

QUESTION 43
Refer to the exhibit. Which type of log is displayed?

A. proxy
B. NetFlow
C. IDS
D. sys

Answer: B

QUESTION 44
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

A. Tapping interrogation replicates signals to a separate port for analyzing traffic
B. Tapping interrogations detect and block malicious traffic
C. Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D. Inline interrogation detects malicious traffic but does not block the traffic

Answer: A

QUESTION 45
Which two components reduce the attack surface on an endpoint? (Choose two.)

A. secure boot
B. load balancing
C. increased audit log levels
D. restricting USB ports
E. full packet captures at the endpoint

Answer: AD

QUESTION 46
An analyst discovers that a legitimate security alert has been dismissed.
Which signature caused this impact on network traffic?

A. true negative
B. false negative
C. false positive
D. true positive

Answer: B

QUESTION 47
Which event artifact is used to identity HTTP GET requests for a specific file?

A. destination IP address
B. TCP ACK
C. HTTP status code
D. URI

Answer: D

QUESTION 48
Which security principle requires more than one person is required to perform a critical task?

A. least privilege
B. need to know
C. separation of duties
D. due diligence

Answer: C

QUESTION 49
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)

A. Untampered images are used in the security investigation process
B. Tampered images are used in the security investigation process
C. The image is tampered if the stored hash and the computed hash match
D. Tampered images are used in the incident recovery process
E. The image is untampered if the stored hash and the computed hash match

Answer: BE

QUESTION 50
What makes HTTPS traffic difficult to monitor?

A. SSL interception
B. packet header size
C. signature detection time
D. encryption

Answer: D

QUESTION 51
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture the analyst cannot determine the technique and payload used for the communication.

Which obfuscation technique is the attacker using?

A. Base64 encoding
B. transport layer security encryption
C. SHA-256 hashing
D. ROT13 encryption

Answer: B

QUESTION 52
What best describes the Security Operations Center (SOC)?

A. The SOC is usually responsible for monitoring and maintaining the overall network infrastructure, its primary function is to ensure uninterrupted network service.
B. A SOC is related to the people, processes, and technologies that are involved in providing situational awareness through the detection, containment, and remediation of information security threats.
C. The SOC is responsible for the physical security of a building or installation location.
D. The SOC and NOC are the same entity, with different names. They are responsible for the health and security of the network infrastructure.

Answer: B

QUESTION 53
Which term represents a potential danger that could take advantage of a weakness in a system?

A. vulnerability
B. risk
C. threat
D. exploit

Answer: C

QUESTION 54
Which artifact is used to uniquely identify a detected file?

A. file timestamp
B. file extension
C. file size
D. file hash

Answer: D

QUESTION 55
How does an attacker observe network traffic exchanged between two users?

A. port scanning
B. man-in-the-middle
C. command injection
D. denial of service

Answer: B

QUESTION 56
Refer to the exhibit. Which event is occurring?

A. A binary named “submit” is running on VM cuckoo1.
B. A binary is being submitted to run on VM cuckoo1
C. A binary on VM cuckoo1 is being submitted for evaluation
D. A URL is being evaluated to see if it has a malicious binary

Answer: C

QUESTION 57
What is a benefit of agent-based protection when compared to agentless protection?

A. It lowers maintenance costs
B. It provides a centralized platform
C. It collects and detects all traffic locally
D. It manages numerous devices simultaneously

Answer: B

QUESTION 58
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

A. decision making
B. rapid response
C. data mining
D. due diligence

Answer: A

QUESTION 59
An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.
Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)

A. signatures
B. host IP addresses
C. file size
D. dropped files
E. domain names

Answer: BE

QUESTION 60
An analyst is exploring the functionality of different operating systems.
What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

A. queries Linux devices that have Microsoft Services for Linux installed
B. deploys Windows Operating Systems in an automated fashion
C. is an efficient tool for working with Active Directory
D. has a Common Information Model, which describes installed hardware and software

Answer: D


Resources From:

1.2020 Latest Braindump2go 200-201 Exam Dumps (PDF & VCE) Free Share:
https://www.braindump2go.com/200-201.html

2.2020 Latest Braindump2go 200-201 PDF and 200-201 VCE Dumps Free Share:
https://drive.google.com/drive/folders/1fTPALtM-eluHFw8sUjNGF7Y-ofOP3s-M?usp=sharing

3.2020 Free Braindump2go 200-201 PDF Download:
https://www.braindump2go.com/free-online-pdf/200-201-Dumps(43-55).pdf
https://www.braindump2go.com/free-online-pdf/200-201-PDF(30-42).pdf
https://www.braindump2go.com/free-online-pdf/200-201-PDF-Dumps(1-15).pdf
https://www.braindump2go.com/free-online-pdf/200-201-VCE(16-29).pdf
https://www.braindump2go.com/free-online-pdf/200-201-VCE-Dumps(56-69).pdf

Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!