100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cisco 200-201 Exam Actual Questions – Exam 2025 With 100% Correct Answers

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
15-02-2025
Written in
2024/2025

What is a benefit of agent-based protection when compared to agentless protection? A. It lowers maintenance costs B. It provides a centralized platform C. It collects and detects all traffic locally D. It manages numerous devices simultaneously - correct answers B Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action? A. decision making B. rapid response C. data mining D. due diligence - correct answers A What is a difference between SOAR and SIEM? A. SOAR platforms are used for threat and vulnerability management, but SIEM applications are not B. SIEM applications are used for threat and vulnerability management, but SOAR platforms are not C. SOAR receives information from a single platform and delivers it to a SIEM D. SIEM receives information from a single platform and delivers

Show more Read less
Institution
Cisco 200-201 E
Course
Cisco 200-201 E










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cisco 200-201 E
Course
Cisco 200-201 E

Document information

Uploaded on
February 15, 2025
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cisco 200-201 Exam Actual Questions –
Exam 2025 With 100% Correct Answers

What is a benefit of agent-based protection when compared to agentless protection?



A. It lowers maintenance costs

B. It provides a centralized platform

C. It collects and detects all traffic locally

D. It manages numerous devices simultaneously - correct answers ✔✔B



Which principle is being followed when an analyst gathers information relevant to a security incident to
determine the appropriate course of action?



A. decision making

B. rapid response

C. data mining

D. due diligence - correct answers ✔✔A



What is a difference between SOAR and SIEM?



A. SOAR platforms are used for threat and vulnerability management, but SIEM applications are not



B. SIEM applications are used for threat and vulnerability management, but SOAR platforms are not



C. SOAR receives information from a single platform and delivers it to a SIEM



D. SIEM receives information from a single platform and delivers it to a SOAR - correct answers ✔✔A

,What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?



A. MAC is controlled by the discretion of the owner and DAC is controlled by an administrator



B. MAC is the strictest of all levels of control and DAC is object-based access



C. DAC is controlled by the operating system and MAC is controlled by an administrator



D. DAC is the strictest of all levels of control and MAC is object-based access - correct answers ✔✔B



Which security principle is violated by running all processes as root or administrator?



A. principle of least privilege

B. role-based access control

C. separation of duties

D. trusted computing base - correct answers ✔✔A



What is the difference between a threat and a risk?



A. Threat represents a potential danger that could take advantage of a weakness, while the risk is the
likelihood of a compromise or damage of an asset.



B. Risk represents the known and identified loss or danger in the system, while threat is a non-identified
impact of possible risks.



C. Risk is the unintentional possibility of damages or harm to infrastructure, while the threats are certain
and intentional.



D. Threat is a state of being exposed to an attack or a compromise, while risk is the calculation of
damage or potential loss affecting the organization from an exposure. - correct answers ✔✔A

, risk is the likelihood ./threat potential danger



A network engineer discovers that a foreign government hacked one of the defense contractors in their
home country and stole intellectual property. What is the threat agent in this situation?



A. the intellectual property that was stolen



B. the defense contractor who stored the intellectual property



C. the method used to conduct the attack



D. the foreign government that conducted the attack - correct answers ✔✔D



Threat agent and Threat actor are the same



A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The
agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the
webserver. Which event category is described?



A. reconnaissance

B. action on objectives

C. installation

D. exploitation - correct answers ✔✔D



What is the relationship between a vulnerability and a threat?



A. A threat exploits a vulnerability

B. A vulnerability is a calculation of the potential loss caused by a threat

C. A vulnerability exploits a threat

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUILLSKY Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
513
Member since
2 year
Number of followers
275
Documents
13973
Last sold
3 days ago
,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS IS THE KEY TO STUDENTS CAREER EXCELLENCE!!!

On this page, you find all documents, package deals, and flashcards offered by seller MAXGRADES WELCOME TO MAXGRADES ALL THE BEST !!!!!!

3.6

129 reviews

5
49
4
23
3
29
2
6
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions