exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 130 discussion

Actual exam question from Cisco's 200-201
Question #: 130
Topic #: 1
[All 200-201 Questions]

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

  • A. Firepower
  • B. Email Security Appliance
  • C. Web Security Appliance
  • D. Stealthwatch
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Faio
10 months ago
The correct answer is D. Stealthwatch.
upvoted 2 times
...
slippery31
1 year ago
Correct ANS= C
upvoted 1 times
...
Stevens0103
1 year ago
Stealthwatch is a network traffic monitoring and analysis tool that provides visibility into network behavior and detects anomalies and threats. It can collect and analyze data from a variety of sources, including network devices, servers, and applications, and generate alerts and reports based on predefined rules and machine learning algorithms. In this case, the engineer can configure Stealthwatch to collect logs from the proxy server and analyze the data to identify any suspicious or malicious activity. Stealthwatch can also correlate the logs with other network data to provide a more comprehensive view of the network and detect advanced threats that may be hiding in the noise. Firepower, Email Security Appliance, and Web Security Appliance are security technologies that can provide additional layers of protection for specific types of traffic, but they are not designed for network monitoring and analysis like Stealthwatch.
upvoted 4 times
...
alhamry
1 year ago
The best answer is C. The Web Security Appliance (WSA) is designed to filter web traffic and enforce corporate security policies. It can also generate logs and alerts based on the traffic it filters, allowing for event correlation and analysis. Firepower is a network security platform that provides intrusion prevention, advanced malware protection, and URL filtering. The Email Security Appliance (ESA) is designed to protect against email-based threats, including spam, viruses, and phishing attacks. Stealthwatch is a network traffic analysis platform that provides visibility into network behavior and detects anomalous activity. While all of these technologies can generate logs, the WSA is the best choice for generating events based on proxy server traffic.
upvoted 2 times
...
mozaki
1 year, 2 months ago
Selected Answer: C
the answer is C WSA: fetches logs related to web traffic such as URLs, web requests, and responses. It also collects information about user activity, web applications, and malware threats.WSA is designed to monitor and control web traffic, fetch logs related to web traffic, and generate alerts and events based on certain conditions or criteria. Stealthwatch: fetches logs related to network traffic such as flow data, NetFlow, and other telemetry data. It also collects information about user and device behavior, network connections, and threat intelligence.
upvoted 1 times
...
mozaki
1 year, 2 months ago
Selected Answer: D
The answer is WSA: fetches logs related to web traffic such as URLs, web requests, and responses. It also collects information about user activity, web applications, and malware threats. Stealthwatch: fetches logs related to network traffic such as flow data, NetFlow, and other telemetry data. It also collects information about user and device behavior, network connections, and threat intelligence. WSA is enough
upvoted 1 times
mozaki
1 year, 2 months ago
The answer is C WSA
upvoted 1 times
...
...
drdecker100
1 year, 3 months ago
Selected Answer: D
The technology that the engineer should use to accomplish this task is D. Stealthwatch. Stealthwatch is a network traffic analysis (NTA) tool that provides real-time visibility into network traffic and helps to detect and respond to threats. It can also be used to fetch logs from various network devices and generate actual security events according to the data received. Firepower, Email Security Appliance, and Web Security Appliance are different security technologies that provide various security features such as firewall, intrusion prevention, email security, and web security.
upvoted 1 times
...
Eng_ahmedyoussef
1 year, 7 months ago
Selected Answer: D
D. is correct Stealthwatch collects telemetry from every part of the network and applies advanced security analytics to the data. It creates a baseline of normal web and network activity for a network host, and applies context-aware analysis to automatically detect anomalous behaviors.
upvoted 1 times
...
aplicacion101
1 year, 10 months ago
Selected Answer: D
D is correct
upvoted 2 times
...
aplicacion101
1 year, 11 months ago
Wsa as proxy can export logs to Stealwatch to analysis and correlation.
upvoted 2 times
...
JayPEI
1 year, 11 months ago
Selected Answer: C
should be WSA
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...