Free 200-201 Exam Dumps

Question 6

Which two compliance frameworks require that data be encrypted when it is transmitted over a public network?
(Choose two.)

Correct Answer:AC

Question 7

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?

Correct Answer:A

Question 8

What is a difference between inline traffic interrogation and traffic mirroring?

Correct Answer:B

Question 9

Which type of data consists of connection level, application-specific records generated from network traffic?

Correct Answer:A

Question 10

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

Correct Answer:C