Questions for the 200-201 were updated on : Oct 04 ,2024
Topic 1
Which event is user interaction?
D
Topic 1
Which security principle requires more than one person is required to perform a critical task?
C
Topic 1
How is attacking a vulnerability categorized?
C
Topic 1
What is a benefit of agent-based protection when compared to agentless protection?
B
Topic 1
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the
appropriate course of action?
A
Topic 1
One of the objectives of information security is to protect the CIA of information and systems.
What does CIA mean in this context?
D
Topic 1
What is rule-based detection when compared to statistical detection?
B
Topic 1
A user received a malicious attachment but did not run it.
Which category classifies the intrusion?
D
Topic 1
Which process is used when IPS events are removed to improve data integrity?
B
Topic 1
An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?
C
Topic 1
What is a difference between SOAR and SIEM?
A
Topic 1
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
B
Topic 1
What is the practice of giving employees only those permissions necessary to perform their specific role within an
organization?
A
Topic 1
What is the virtual address space for a Windows process?
D
Topic 1
Which security principle is violated by running all processes as root or administrator?
A