
Cisco CyberOps Review 1
Presentation
•
Computers
•
Professional Development
•
Hard
Jason Clifford
FREE Resource
22 Slides • 19 Questions
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Multiple Choice
What does it mean when access to a resource is granted with discretionary control?
Access can be configured only by an administrator.
Access can be granted only by the owner of the resource.
Access is granted to all users.
Access is read-only for everyone.
16
Multiple Choice
In the field of information security, the CIA of data is a crucial point of concern. What does CIA refer to?
The data’s Confidentiality, Integrity, and Availability.
The data’s Confidentiality, Identity, and Availability.
The data’s Confidentiality, Integrity, and Authorization.
The data’s Confidentiality, Identity, and Authorization.
17
Multiple Choice
Which of the following refers to disassembling an object to understand how it works and study its structure and behavior?
Threat actor
Threat hunting
Reverse engineering
Malware analysis
18
Multiple Choice
Which of the following represents the use of a vulnerability to breach a system?
Exploit
Threat
Zero trust
Vulnerability
19
20
21
Multiple Choice
Which cryptographic key is used by an X.509 certificate?
Symmetric
Public
Private
Asymmetric
22
Multiple Choice
Which of the following describes the advantages of application visibility and control?
Applications and traffic in the network are controlled to protect assets against attacks and manage bandwidth.
All documents are encrypted with a private key.
Establishes a platform to test environments for unknown threats.
Provides a database that stores low-level settings for the operating system.
23
Multiple Choice
Which of the following is a code injection technique that launches malicious statements via input fields?
DDoS
SQLi
Brute-force
SSRF
24
Multiple Choice
Which type of attack can a traditional firewall protect a system against?
Dumpster diving
Denial-of-Service (DoS)
Phishing
Shoulder surfing
25
26
Multiple Choice
Which of the following definitions of the Windows registry is correct?
A set of pages that currently reside in physical memory.
A basic unit to which the operating system allocates processor time.
A set of virtual memory addresses.
A database that stores low-level settings for the operating system.
27
Multiple Choice
Which of the following best describes the IIS Log Parser tool?
A dynamic tool that allows execution of SQL-like queries for log files.
A tool used to control data sources, such as databases.
A tool that monitors the availability of log files.
A tool used for remote database connection.
28
Multiple Choice
Which of the following terms applies to evidence that supports existing theories derived from an original piece of evidence?
Corroborative
Probabilistic
Accurate
Indirect
29
Multiple Choice
Which directory is commonly used in Linux systems to store log files, including syslog and Apache access logs?
/etc/log
/root/log
/lib/log
/var/log
30
31
32
Multiple Choice
Which of the following terms refers to a case in which an IDS fails to identify an actual attack?
True positive
False negative
True negative
False positive
33
Multiple Choice
Which of the following refers to improving data integrity by removing IPS events?
Digital signing
Operational cleaning
Data normalization
Integrity validation
34
Multiple Choice
John sent an HTTP GET request to get a file from the web server. Which event artifact will identify the request?
URI
HTTPS
Destination MAC address
Source IP address
35
36
37
Multiple Select
Which of the following relate to the preparation phase?
(Choose more than one)
Smartphones available for emergency communication.
Communication and coordination mechanisms that serve as backups in case of a failure.
Secure storage facilities.
None of the above.
38
Multiple Choice
What is adjusting security according to threats from a hacktivist group known as in NIST SP800-61 r2?
Adjustment
Preparation
Precursor
Instigator
39
Multiple Choice
When an instruction is issued stating that more than one person must perform a critical task, which principle is being followed?
There is no such particular principle
Separation of duties
Due diligence
Free action
40
Multiple Choice
Which property of information security does encryption support?
Integrity
Availability
Confidentiality
Sustainability
41
Show answer
Auto Play
Slide 1 / 41
SLIDE
Similar Resources on Wayground
35 questions
G8_ Lifestyles (1)
Presentation
•
Professional Development
38 questions
System Implementation
Presentation
•
University
36 questions
Newton's first Law
Presentation
•
KG
35 questions
TRW Usage of Tenses Review
Presentation
•
Professional Development
36 questions
h11 4 moeilijke situaties
Presentation
•
Professional Development
32 questions
The Software Development Life Cycle
Presentation
•
Professional Development
38 questions
Stereotype, Bias, Discrimination, and Prejudice
Presentation
•
University
33 questions
Expressing possession: Spanish possessive adjectives
Presentation
•
University
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade