Cisco® 200-201 Exam Practice Questions (P. 2)
- Full Access (462 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
- AMAC is controlled by the discretion of the owner and DAC is controlled by an administrator
- BMAC is the strictest of all levels of control and DAC is object-based accessMost Voted
- CDAC is controlled by the operating system and MAC is controlled by an administrator
- DDAC is the strictest of all levels of control and MAC is object-based access
Correct Answer:
B
B

The distinction between MAC and DAC lies in their approach to controlling access. MAC is known for its strict, rule-based control where access permissions are predetermined by policies established at a system or administrative level, ensuring a high level of security by limiting discretion. On the other hand, DAC allows the owners of the resources to determine access permissions, making it more flexible but potentially less secure as it relies on individual discretion. This underlines why MAC is considered stricter compared to the more personalized approach of DAC.
send
light_mode
delete
Question #12
What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?
- Aleast privilegeMost Voted
- Bneed to know
- Cintegrity validation
- Ddue diligence
Correct Answer:
A
A

Absolutely, the "least privilege" principle is crucial in information security for minimizing potential vulnerabilities within an organization. By assigning the bare minimum level of access necessary for employees to carry out their work efficiently, the strategy effectively slashes the risk of unauthorized data exposure or tampering. Ensuring each employee has access strictly tailored to their duties helps maintain a tighter and more secure operational environment. Spot-on with answer A here—it's exactly what we're talking about when we discuss controlling access to safeguard sensitive info and critical systems.
send
light_mode
delete
Question #13
What is the virtual address space for a Windows process?
- Aphysical location of an object in memory
- Bset of pages that reside in the physical memory
- Csystem-level memory protection feature built into the operating system
- Dset of virtual memory addresses that can be usedMost Voted
Correct Answer:
D
D

From my review of the resources and explanations involved, the correct answer to what constitutes a virtual address space in a Windows operating system seems to center around the set of virtual memory addresses available for a process to use. It's important to distinguish that this does not directly relate to the physical location, but rather, to the range of addresses that software can utilize during its execution. Interestingly, this virtual address space is conceptually private to each process, enhancing security by default, as it prevents direct memory access conflicts between processes. Hence, students should focus on understanding virtual address space as primarily a range of addresses allotted per process for its operational requirements.
send
light_mode
delete
Question #14
Which security principle is violated by running all processes as root or administrator?
- Aprinciple of least privilegeMost Voted
- Brole-based access control
- Cseparation of duties
- Dtrusted computing base
Correct Answer:
A
A

Absolutely! The principle of least privilege is all about keeping access tight - only give what's absolutely necessary for the job. When you let all processes run with root or admin privileges, you’re throwing the doors wide open for potential abuse or mishaps, especially if a less secure application gets compromised. So yeah, sticking to just what’s needed not only keeps things tidy but also safer!
send
light_mode
delete
Question #15
What is the function of a command and control server?
- AIt enumerates open ports on a network device
- BIt drops secondary payload into malware
- CIt is used to regain control of the network after a compromise
- DIt sends instruction to a compromised systemMost Voted
Correct Answer:
D
D

The function of a Command and Control (C2) server is primarily to issue commands and control a compromised system remotely. Once a device is compromised, the C2 server provides a central point for the attacker to coordinate actions on infected machines. These actions could range from further malware installation to data theft or launching attacks such as DDoS. This centralized control differentiates a C2 server from other attack methods that might involve direct payload delivery or incident response techniques.
send
light_mode
delete
Question #16
What is the difference between deep packet inspection and stateful inspection?
- ADeep packet inspection is more secure than stateful inspection on Layer 4
- BStateful inspection verifies contents at Layer 4 and deep packet inspection verifies connection at Layer 7
- CStateful inspection is more secure than deep packet inspection on Layer 7
- DDeep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #17
Which evasion technique is a function of ransomware?
- Aextended sleep calls
- Bencryption
- Cresource exhaustionMost Voted
- Dencoding
Correct Answer:
B
B
send
light_mode
delete
Question #18

Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.)
- AFirst Packet
- BInitiator User
- CIngress Security Zone
- DSource PortMost Voted
- EInitiator IPMost Voted
Correct Answer:
DE
DE
send
light_mode
delete
Question #19
DRAG DROP -
Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:

Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:

send
light_mode
delete
Question #20
What is the difference between statistical detection and rule-based detection models?
- ARule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
- BStatistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basisMost Voted
- CStatistical detection involves the evaluation of an object on its intended actions before it executes that behavior
- DRule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
Correct Answer:
B
B
send
light_mode
delete
All Pages