00:00

QUESTION 56

Which system monitors local system operation and local network access for violations of a security policy?

Correct Answer: A
HIDS is capable of monitoring the internals of a computing system as well as the network packets on its network interfaces. Host-based firewall is a piece of software running on a single Host that can restrict incoming and outgoing Network activity for that host only.

QUESTION 57

Refer to the exhibit.
200-201 dumps exhibit
What is the potential threat identified in this Stealthwatch dashboard?

Correct Answer: C
"EX" = exfiltration And there are three.
Also the "suspect long flow" and "suspect data heading" suggest, for example, DNS exfiltration
https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/smc_users_guide/SW_6 page 177.

QUESTION 58

Which category relates to improper use or disclosure of PII data?

Correct Answer: C

QUESTION 59

What is a difference between SIEM and SOAR?

Correct Answer: B

QUESTION 60

Refer to the exhibit.
200-201 dumps exhibit
Which type of log is displayed?

Correct Answer: B