nerdexam
CiscoCisco

200-201 · Question #227

200-201 Question #227: Real Exam Question with Answer & Explanation

Sign in or unlock 200-201 to reveal the answer and full explanation for question #227. The question stem and answer options stay visible for context.

Submitted by wei.xz· Mar 6, 2026Host-Based Analysis

Question

An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an externa USB device to bypass security restrictions and steal data. The engineer could not find an external USB device. Which piece of information must an engineer use for attribution in an investigation?

Options

  • Alist of security restrictions and privileges boundaries bypassed
  • Bexternal USB device
  • Creceptionist and the actions performed
  • Dstolen data and its criticality assessment

Unlock 200-201 to see the answer

You've previewed enough free 200-201 questions. Unlock 200-201 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#incident response#attribution#forensics#insider threat
Full 200-201 PracticeBrowse All 200-201 Questions