200-201試験無料問題集「Cisco Understanding Cisco Cybersecurity Operations Fundamentals 認定」

Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?

解説: (GoShiken メンバーにのみ表示されます)
Which statement describes patch management?

解説: (GoShiken メンバーにのみ表示されます)
What is threat hunting?

解説: (GoShiken メンバーにのみ表示されます)
What do host-based firewalls protect workstations from?

解説: (GoShiken メンバーにのみ表示されます)
How does an attack surface differ from an attack vector?

解説: (GoShiken メンバーにのみ表示されます)
Why should an engineer use a full packet capture to investigate a security breach?

解説: (GoShiken メンバーにのみ表示されます)
What is the principle of defense-in-depth?

解説: (GoShiken メンバーにのみ表示されます)
At a company party a guest asks questions about the company's user account format and password complexity. How is this type of conversation classified?

解説: (GoShiken メンバーにのみ表示されます)
Refer to the exhibit.

Which two elements in the table are parts of the 5-tuple? (Choose two.)

解説: (GoShiken メンバーにのみ表示されます)
Which event is a vishing attack?

解説: (GoShiken メンバーにのみ表示されます)
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?

解説: (GoShiken メンバーにのみ表示されます)
Which process is used when IPS events are removed to improve data integrity?

An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?

解説: (GoShiken メンバーにのみ表示されます)
Which system monitors local system operation and local network access for violations of a security policy?

解説: (GoShiken メンバーにのみ表示されます)
How does an attacker observe network traffic exchanged between two users?

解説: (GoShiken メンバーにのみ表示されます)
An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

解説: (GoShiken メンバーにのみ表示されます)
A SOC analyst detected connections to known C&C and port scanning activity to main HR database servers from one of the HR endpoints via Cisco StealthWatch. What are the two next steps of the SOC team according to the NISTSP800-61 incident handling process? (Choose two)

解説: (GoShiken メンバーにのみ表示されます)
Refer to the exhibit.
A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded what would have occurred with stronger data visibility.

解説: (GoShiken メンバーにのみ表示されます)
Which action matches the weaponization step of the Cyber Kill Chain Model?

解説: (GoShiken メンバーにのみ表示されます)