Search Header Logo
Cisco CyberOps Review 1

Cisco CyberOps Review 1

Assessment

Presentation

Computers

Professional Development

Hard

Created by

Jason Clifford

FREE Resource

22 Slides • 19 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

media

12

media

13

media

14

media

15

Multiple Choice

What does it mean when access to a resource is granted with discretionary control?

1

Access can be configured only by an administrator.

2

Access can be granted only by the owner of the resource.

3

Access is granted to all users.

4

Access is read-only for everyone.

16

Multiple Choice

In the field of information security, the CIA of data is a crucial point of concern. What does CIA refer to?

1

The data’s Confidentiality, Integrity, and Availability.

2

The data’s Confidentiality, Identity, and Availability.

3

The data’s Confidentiality, Integrity, and Authorization.

4

The data’s Confidentiality, Identity, and Authorization.

17

Multiple Choice

Which of the following refers to disassembling an object to understand how it works and study its structure and behavior?

1

Threat actor

2

Threat hunting

3

Reverse engineering

4

Malware analysis

18

Multiple Choice

Which of the following represents the use of a vulnerability to breach a system?

1

Exploit

2

Threat

3

Zero trust

4

Vulnerability

19

media

20

media

21

Multiple Choice

Which cryptographic key is used by an X.509 certificate?

1

Symmetric

2

Public

3

Private

4

Asymmetric

22

Multiple Choice

Which of the following describes the advantages of application visibility and control?

1

Applications and traffic in the network are controlled to protect assets against attacks and manage bandwidth.

2

All documents are encrypted with a private key.

3

Establishes a platform to test environments for unknown threats.

4

Provides a database that stores low-level settings for the operating system.

23

Multiple Choice

Which of the following is a code injection technique that launches malicious statements via input fields?

1

DDoS

2

SQLi

3

Brute-force

4

SSRF

24

Multiple Choice

Which type of attack can a traditional firewall protect a system against?

1

Dumpster diving

2

Denial-of-Service (DoS)

3

Phishing

4

Shoulder surfing

25

media

26

Multiple Choice

Which of the following definitions of the Windows registry is correct?

1

A set of pages that currently reside in physical memory.

2

A basic unit to which the operating system allocates processor time.

3

A set of virtual memory addresses.

4

A database that stores low-level settings for the operating system.

27

Multiple Choice

Which of the following best describes the IIS Log Parser tool?

1

A dynamic tool that allows execution of SQL-like queries for log files.

2

A tool used to control data sources, such as databases.

3

A tool that monitors the availability of log files.

4

A tool used for remote database connection.

28

Multiple Choice

Which of the following terms applies to evidence that supports existing theories derived from an original piece of evidence?

1

Corroborative

2

Probabilistic

3

Accurate

4

Indirect

29

Multiple Choice

Which directory is commonly used in Linux systems to store log files, including syslog and Apache access logs?

1

/etc/log

2

/root/log

3

/lib/log

4

/var/log

30

media

31

media

32

Multiple Choice

Which of the following terms refers to a case in which an IDS fails to identify an actual attack?

1

True positive

2

False negative

3

True negative

4

False positive

33

Multiple Choice

Which of the following refers to improving data integrity by removing IPS events?

1

Digital signing

2

Operational cleaning

3

Data normalization

4

Integrity validation

34

Multiple Choice

John sent an HTTP GET request to get a file from the web server. Which event artifact will identify the request?

1

URI

2

HTTPS

3

Destination MAC address

4

Source IP address

35

media

36

media

37

Multiple Select

Which of the following relate to the preparation phase?

(Choose more than one)

1

Smartphones available for emergency communication.

2

Communication and coordination mechanisms that serve as backups in case of a failure.

3

Secure storage facilities.

4

None of the above.

38

Multiple Choice

What is adjusting security according to threats from a hacktivist group known as in NIST SP800-61 r2?

1

Adjustment

2

Preparation

3

Precursor

4

Instigator

39

Multiple Choice

When an instruction is issued stating that more than one person must perform a critical task, which principle is being followed?

1

There is no such particular principle

2

Separation of duties

3

Due diligence

4

Free action

40

Multiple Choice

Which property of information security does encryption support?

1

Integrity

2

Availability

3

Confidentiality

4

Sustainability

41

media
media

Show answer

Auto Play

Slide 1 / 41

SLIDE