CiscoCisco
200-201 · Question #545
200-201 Question #545: Real Exam Question with Answer & Explanation
Sign in or unlock 200-201 to reveal the answer and full explanation for question #545. The question stem and answer options stay visible for context.
Submitted by manish99· Mar 6, 2026Security Monitoring
Question
Refer to the exhibit. During an investigation of unauthorized data exfiltration from a company's network, these logs were collected. Which log entry would be considered the best evidence for proving the specific method and time of data exfiltration?
Options
- Aweb proxy log
- Bdatabase access log
- CVPN connection log
- Demail server log
Unlock 200-201 to see the answer
You've previewed enough free 200-201 questions. Unlock 200-201 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#data exfiltration#log analysis#web proxy logs#incident response