exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 159 discussion

Actual exam question from Cisco's 200-201
Question #: 159
Topic #: 1
[All 200-201 Questions]

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?

  • A. event name, log source, time, source IP, and username
  • B. event name, log source, time, source IP, and host name
  • C. protocol, log source, source IP, destination IP, and host name
  • D. protocol, source IP, source port destination IP, and destination port
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Reference:
https://blogs.cisco.com/security/the-dreaded-5-tuple

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
seyfo
10 months, 1 week ago
Selected Answer: D
D is correct
upvoted 1 times
...
Eng_ahmedyoussef
1 year, 1 month ago
Selected Answer: D
D is Correct 5-Touple ==> protocol, source IP, source port destination IP, and destination port
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...