Search Header Logo
Cisco CyberOps Review 2

Cisco CyberOps Review 2

Assessment

Presentation

Computers

Professional Development

Medium

Created by

Jason Clifford

Used 1+ times

FREE Resource

9 Slides • 101 Questions

1

media

2

media

3

media

4

Multiple Choice

One of the objectives of information security is to protect the

CIA of information and systems. What does CIA mean in this

context?

1

Confidentiality, integrity, and availability

2

Confidentiality, identity, and availability

3

Confidentiality, integrity, and authorization

4

Confidentiality, identity, and authorization

5

Multiple Choice

According to RFC

1035, which transport protocol is

recommended for use with DNS queries?

1

Transmission Control Protocol

2

Reliable Data Protocol

3

Hypertext Transfer Protocol

4

User Datagram Protocol

6

Multiple Choice

Which term represents the chronological record of how

evidence was collected, analyzed, preserved, and transferred?

1

Chain of evidence

2

Evidence chronology

3

Chain of custody

4

Record of safekeeping

7

Multiple Choice

In computer security, what information does PHI describe?

1

Private host information

2

Protected health information

3

Personal health information

4

Protected host information

8

Multiple Choice

Which protocol maps IP network addresses to MAC hardware

addresses so that IP packets can be sent across networks?

1

Internet Control Message Protocol

2

Address Resolution Protocol

3

Session Initiation Protocol

4

Transmission Control Protocol/Internet Protocol

9

Multiple Choice

Which term represents a weakness in a system that could lead

to a system compromise?

1

Vulnerability

2

Threat

3

Exploit

4

Risk

10

Multiple Select

Which two tasks can be performed by analyzing the logs

of a traditional stateful firewall? (Choose two.)

1

Confirm the timing of network connections differentiated by

the TCP 5 tuple.

2

Audit applications used on a social networking website.

3

Determine user IDs involved in an instant message exchange.

4

Map internal private IP addresses to dynamically translated

external public IP addresses.

5

Identify a malware variant carried over an SMTP connection.

11

Multiple Choice

Based on which statement does the discretionary access control

security model grant or restrict access?

1

Discretion of the system administrator

2

Security policy defined by the owner of an object

3

Security policy defined by the system administrator

4

Role of a user within an organization

12

Multiple Choice

Which security monitoring data type is associated with

application server logs?

1

Alert data

2

Statistical data

3

Session data

4

Transaction data

13

Multiple Choice

Which activity may be an example of social engineering?

1

Receiving a call from the IT department asking you to verify

your username/password to maintain your account

2

Receiving an invitation to your department s weekly WebEx

meeting

3

Sending a verbal request to an administrator to change the

password of an account the administrator recognizes

4

Receiving an email from MR requesting that you visit the

secure HR website and update your contract information

14

Multiple Choice

Which of the following describes the Zero Trust model?

1

A unique trust model that establishes an encrypted

connection between devices in a private network

2

A model designed to protect systems by requiring

authentication for any device or person trying to access

the network

3

A model that creates a blacklist that includes all devices

that are not allowed to access resources

4

None of the above

15

Multiple Choice

Which of the following is not related to SIEM system activity?

1

Monitoring

2

Service privileges

3

Incident response and log auditing

4

Total traffic encryption

16

Multiple Choice

In security terms, which of the following describes the

principle of least privilege (POLP)?

1

Maintains regular network traffic to avoid overloads

2

Enterprise data management system

3

Restricts user permissions to the minimum required

for their work

4

Keeps computing systems up to date to improve

protection

17

Multiple Choice

Which of the following is the correct definition of threat

actors in cybersecurity?

1

A person or group of people trying to perform malicious

acts against organizations, whether unintentionally or

intentionally

2

A very strong hacking tool that helps commit malicious

acts against organizations

3

Any malicious activity that occurs on mobile devices

4

Offensive security professionals who are experts in

attacking systems and breaking through defenses

18

Multiple Choice

Which of the following describes the run book automation (RBA)?

1

A system designed to enrich the IT department s knowledge

of innovations in the field

2

External hardware designed to protect enterprise computing

systems by alerting the IT department about changes

3

Maps internal private IP addresses to dynamically translated

external public IP addresses

4

A technology used to automate IT operations management

19

Multiple Choice

Which of the following describes the Threat Intelligence

Platform (TIP)?

1

A platform that provides testing environments for

unknown threats

2

Hardware that is installed on enterprise computers to

provide updates about security threats

3

A platform that gathers raw data to produce useable

information for automated security control systems

4

A unique trust platform that creates an encrypted

connection between devices in a private network

20

Multiple Choice

Which of the following describes SOAR?

1

Helps improve enterprise networking processes by speeding

up network traffic

2

Collects data on security threats from a variety of sources and

responds to security incidents without human assistance

3

Collects data about user activity in the organization and

provides remote help for errors

4

A cybersecurity teamwork method for responding to events

21

Multiple Choice

Which of the following represents the use of a vulnerability

in a system that can help hackers breach a system?

1

Exploit

2

Threat

3

Zero trust

4

Vulnerability

22

Multiple Choice

Which of the following describes Defense in Depth (

DiD )?

1

A c ertification valued by cybersecurity professionals

2

Software designed to help a cybersecurity department

receive updates on the organization s security systems

3

A platform that provides testing environments for unknown

threats

4

A series of layered protection mechanisms used to protect

important data and information

23

Multiple Choice

Which of the following represents an access control model that

enables users to perform activities based on the permissions

assigned to their roles?

1

Nondiscretionary access control

2

Role-based access control

3

Time-based access control

4

Rule-based access control

24

Multiple Choice

Which of the following describes a type of security access

control that grants or restricts object access via policies

determined by the object s owner?

1

Rule based access control

2

Nondiscretionary access control

3

Discretionary access control

4

Mandatory access control

25

media

26

Multiple Choice

For which of the following access control models is the

main purpose preserving the confidentiality of data?

1

Mandatory access control

2

Role-based access control

3

Nondiscretionary access control

4

Time-based access control

27

Multiple Choice

Which of the following refers to disassembling an object to see

how it works and to study its structure and behavior?

1

Threat actor

2

Threat hunting

3

Reverse engineering

4

Malware analysis

28

media

29

Multiple Select

Stateful and traditional firewalls can analyze packets and judge them

against a set of predetermined rules called access control lists (ACLs).

Which of the following elements do they inspect within a packet?

(Choose two.)

1

Session headers

2

NetFlow flow information

3

Source and destination ports and IP addresses

4

Protocol information

30

Multiple Select

Which of the following are Layer

2 network attacks?

(Choose three.)

1

ARP attack

2

Brute force attack

3

Spoofing attack

4

DDoS attack

5

VLAN hopping

31

Multiple Choice

Which definition of Windows Registry is correct?

1

A set of pages that currently reside in physical memory

2

A basic unit to which the operating system allocates

processor time

3

A set of virtual memory addresses

4

A database that stores low-level settings for the operating

system

32

Multiple Choice

While viewing packet capture data, you notice that an IP is

sending and receiving traffic for multiple devices by modifying

the IP header. Which of the following makes this behavior

possible?

1

TOR

2

NAT

3

Encapsulation

4

Tunneling

33

Multiple Choice

Which is the correct definition of an antivirus program?

1

A program used to detect and remove unwanted malicious

software from the system

2

A program that provides real-time analysis of security alerts

generated by network hardware and applications

3

A program that scans a running application for vulnerabilities

4

Rules that allow network traffic to pass in and out

34

Multiple Choice

Which type of attack occurs when a botnet is used to transmit

requests from an NTP server to overwhelm the target?

1

On-Path

2

Denial of Service

3

Distributed Denial of Service

4

Replay

35

Multiple Choice

In NetFlow records, which flags indicate that an HTTP connection

was stopped by a security appliance, such as a firewall, before it

could be fully established?

1

ACK

2

SYN ACK

3

RST

4

PSH, ACK

36

Multiple Select

Which of the following terms represent types of cross-site

scripting attacks? (Choose two.)

1

Directed

2

Encoded

3

Stored

4

Reflected

5

Cascaded

37

Multiple Choice

If a router has four interfaces and each interface is connected to four

switches, how many broadcast domains are present on the router?

1

1

2

2

3

4

4

8

38

Multiple Choice

Which cryptographic key is contained in an X.

509 certificate?

1

Symmetric

2

Public

3

Private

4

Asymmetric

39

Multiple Choice

Which of the following is the correct definition of

tcpdump

1

A program used for sniffing and filtering network traffic

2

A program used to detect and remove unwanted malicious

software from the system

3

A program used to ensure the privacy of a certificate

4

Technology used to automate IT operation management

40

Multiple Select

Which of the following does NetFlow use to determine if

traffic belongs to the same flow? (Select three.)

1

Port numbers

2

MAC address

3

IP address

4

Interface name

41

Multiple Choice

Which of the following is an advantage of NGFW over a firewall?

1

Dynamic packet filtering

2

Filtering packets based on applications

3

Static packet filtering

4

VPN support

42

Multiple Choice

Which type of attack can a traditional firewall protect

a system against?

1

Dumpster diving

2

Denial of Service (DoS)

3

Phishing

4

Shoulder surfing

43

Multiple Choice

Which of the following describes the advantages of application

visibility and control?

1

Applications and traffic in the network are controlled to

protect assets against attacks and manage bandwidth.

2

All documents are encrypted with a private key.

3

Establishes a platform to test environments for unknown

threats

4

Provides a database that stores low level settings for the

operating system

44

Multiple Choice

Which of the following refers to data that web content

filtering provides?

1

Information about the volume of computer storage usage

2

Data about existing threats on the network

3

Reports providing visibility of actual blocks and web usage

4

Reports pertaining to additional tools running online

45

Multiple Choice

Which of the following refers to data that email content

filtering provides?

1

In-depth analysis of information traffic

2

A report on the remaining storage volume for email use

3

Information about contacts frequently communicated with

via email

4

Probability that messages are legitimate or spam

46

Multiple Choice

Which of the following describes the effect of encryption on data?

1

Optimizes data traffic

2

Scrambles a message or information so that only authorized

parties can access it

3

Ensures that information is not lost along the way and data is

transferred more efficiently and securely

4

Compresses information and saves storage space

47

Multiple Choice

Which of the following describes the effect of encapsulation on data?

1

Hides an object from unwanted access

2

Ensures that sent or received information is correct

3

Ensures that no information leakage can occur

4

Checks if invalid characters are used

48

Multiple Choice

Which of the following describes the benefit of using a load balancer?

1

In depth analysis of information traffic

2

Encrypts all data with a private key

3

Improves service availability and helps prevent downtime

4

Stores low level settings for the operating system

49

Multiple Choice

Which of the following is a code injection technique that launches

malicious statements via input fields?

1

DDoS

2

SQLi

3

Brute-force

4

SSRF

50

Multiple Choice

Which of the following is an attack in which the attacker secretly

relays and possibly alters communication between two parties?

1

XSS

2

SQLi

3

Brute-force

4

MITM

51

Multiple Choice

Which of the following is an attack in which multiple systems flood

the bandwidth?

1

Brute-force

2

SQLi

3

DDoS

4

XSS

52

Multiple Choice

Which of the following allows you to create a secure connection to

another network over the internet?

1

VPN

2

Proxy server

3

Proxy chains

4

None of the above

53

Multiple Choice

Which of the following is a technique used by cybercrooks to trick

users into revealing confidential information?

1

SQLi

2

Social engineering

3

MITM

4

DDoS

54

Multiple Choice

Which of the following represents a mechanism that allows

users to protect their privacy against a common form of

internet surveillance known as traffic analysis?

1

Access control list

2

TOR

3

tcpdump

4

NetFlow

55

Multiple Choice

Which of the following is an attack that exploits a vulnerable

application and executes commands on a remote host?

1

MITM

2

Command injection

3

SQLi

4

XSS

56

Multiple Choice

Which of the following is

most commonly used in PPTP,

L 2 TP/IPsec, SSTP, and OpenVPN?

1

Tunneling

2

STP

3

P2P

4

PAT

57

Multiple Choice

Which of the following uses a set of rules that filter network traffic

and can be configured on network devices with packet filtering

capabilities, such as routers and firewalls?

1

Next-gen firewall

2

NetFlow

3

Web content filtering

4

Access control list

58

Multiple Select

Which of the following are elements of X.509 certificates?

(Choose two.)

1

Last name sign

2

Signature algorithm ID

3

Serial name

4

Version number

59

Multiple Choice

Which of the following is a process that allows two computers

to use the same cryptographic algorithm?

1

X.509

2

Cipher suite

3

Key exchange

4

PKCS

60

Multiple Choice

Which of the following is an IDS that monitors and analyzes

data while logging malicious behavior?

1

Host based intrusion detection

2

Windows Defender

3

Wireshark

4

Network based intrusion detection

61

Multiple Choice

Which of the following is software that runs on an individual

computer to protect it from viruses and malware and to control the

spread of harmful infections throughout the network?

1

Host-based intrusion detection

2

Host-based firewall

3

Application-level allow/deny listing

4

System-based sandboxing

62

Multiple Choice

Which of the following is a safe, isolated environment that

replicates an end-user operating environment within which code

can be run, observed, and rated based on activity rather than

attributes?

1

Application-level allow/deny listing

2

Host-based firewall

3

Host-based intrusion detection

4

Systems-based sandboxing

63

Multiple Choice

Which of the following is the practice of specifying an index of

approved software applications or executable files that are

permitted to be present and active on a computer system?

1

Application-level deny listing

2

Systems-based sandboxing

3

Application-level allow listing

4

Host-based firewall

64

Multiple Choice

Which of the following describes a situation in which an attacker

can use injected scripts to change the content of a website or even

redirect the browser to another webpage that, for example,

contains malicious code?

1

Cross-site scripting

2

SQL Injection

3

DDoS

4

Command injection

65

Multiple Choice

Which of the following occurs when data exceeds its limits

and overwrites memory locations?

1

MITM

2

Command injection

3

Buffer overflow

4

DDoS

66

Multiple Choice

Which of the following describes a computer program designed to

infiltrate and damage a computer without user interaction?

1

Malware

2

Cross-site scripting

3

Buffer overflow

4

MITM

67

Multiple Choice

Which of the following describes malware in which rogue software

code effectively holds a user s computer hostage until a fee is paid?

1

DDoS

2

Ransomware

3

SQL injection

4

Command injection

68

media

69

Multiple Choice

A user reports difficulty accessing certain external web pages. When

examining traffic to and from the external domain in full packet

captures, you notice many SYNs that have the same sequence

number, source, and destination IP address but different payloads.

Which of the following could possibly explain the situation?

1

Insufficient network resources

2

Failure of full packet capture solution

3

Misconfiguration of a web filter

4

TCP injection

70

Multiple Choice

Which tool is commonly used by threat actors on a webpage to

take advantage of software vulnerabilities on a system and spread

malware?

1

Exploit kit

2

Rootkit

3

Vulnerability kit

4

Script kiddie kit

71

Multiple Choice

Which of the following represents the practice of giving employees

only permissions necessary to perform their specific role within an

organization?

1

Integrity validation

2

Due diligence

3

Need to know

4

Least privilege

72

Multiple Choice

What may be responsible for making security monitoring

for HTTPS traffic difficult?

1

Encryption

2

Large packet headers

3

Signature detection takes longer

4

SSL interception

73

Multiple Choice

Which directory is commonly used in Linux systems to store log

files, including syslog and Apache access logs?

1

/etc/log

2

/root/log

3

/lib/log

4

/var/log

74

Multiple Choice

Which definition of the IIS log parser tool is correct?

1

A module for IIS that allows you to log into a database

2

A data source control to connect to your data source

3

A powerful, versatile tool that makes it possible to run

SQL like queries in log files

4

A powerful, versatile tool that verifies the integrity of

log files

75

Multiple Choice

Which definition of the virtual address space for a

Windows process is true?

1

Actual physical location of an object in memory

2

A set of virtual memory addresses the process can use

3

A set of pages that currently reside in physical memory

4

A system level memory protection feature built into the

operating system

76

Multiple Choice

Which situation indicates application-level allow listing

1

Allow everything and deny specific executable files

2

Allow specific executable files and deny other executable files

3

Daily writing of application-based attacks on a whiteboard

4

Allow specific files and deny everything else

77

Multiple Choice

If a web server accepts input from the user and passes it

to a Bash shell, to which attack method is it vulnerable?

1

Input validation

2

Hash collision

3

Command injection

4

Integer overflow

78

Multiple Choice

Where is a host

based intrusion detection system located?

1

On a particular endpoint as an agent or desktop application

2

On a dedicated proxy server monitoring egress traffic

3

On a span switch port

4

On a tap switch port

79

Multiple Choice

Which of the following describes a situation in which a virus

scanner identifies a file as a virus, when it isn t really a virus,

and then tries to delete it?

1

True positive

2

False negative

3

True negative

4

False positive

80

Multiple Choice

Which of the following is true if the IDS identifies activity as

an attack and the activity is actually an attack?

1

True positive

2

False negative

3

True negative

4

False positive

81

Multiple Choice

Which of the following is the case when an IDS does not

identify an actual attack?

1

True positive

2

False negative

3

True negative

4

False positive

82

media

83

Multiple Select

Which of the following are Cisco cloud security solutions?

(Choose two.)

1

CloudDLP

2

OpenDNS

3

CloudLock

4

CloudSLS

84

Multiple Select

What are the advantages of full

duplex transmission mode,

as opposed to half duplex mode? (Select all correct answers.)

1

Each station can transmit and receive at the same time.

2

It avoids collisions.

3

It makes use of backoff time.

4

It uses a collision avoidance algorithm to transmit data.

85

Multiple Choice

Which of the following metrics can measure the effectiveness of a

runbook?

1

Mean time to repair (MTTR)

2

Mean time between failures (MTBF)

3

Mean time to discover a security incident

4

All of the above

86

Multiple Choice

Which technology allows

a large number of private IP addresses

to be represented by a smaller number of public IP addresses?

1

NAT

2

NTP

3

RFC 1631

4

RFC 1918

87

Multiple Select

Which features must a next

generation firewall include?

(Choose two.)

1

Data mining

2

Host-based antivirus

3

Application visibility and control

4

Security information and event management

5

Intrusion detection system

88

Multiple Choice

Which type of attack occurs when an attacker is successful in

eavesdropping on a conversation between two IPS phones?

1

Replay

2

On-Path

3

Dictionary

4

Known plaintext

89

Multiple Choice

Which network device is used to separate broadcast domains?

1

Router

2

Repeater

3

Switch

4

Bridge

90

Multiple Choice

Which identifier is used to describe the application or process

that submits a log message?

1

Action

2

Selector

3

Facility

4

Priority

91

Multiple Choice

Which security monitoring data type requires the most storage space?

1

Full packet capture

2

Transaction data

3

Statistical data

4

Session data

92

Multiple Select

Which of the following protocols are used for email?

(Choose two.)

1

NTP

2

DNS

3

HTTP

4

IMAP

5

SMTP

93

Multiple Choice

Which of the following is the maximum size of an IPv4 header?

1

32 bytes

2

60 bytes

3

64 bytes

4

20 bytes

94

Multiple Choice

Which of the following is a disadvantage of a

Brute force attack?

1

Most passwords today are complex.

2

The password may not be in the list or dictionary.

3

The attack requires a lot of time and resources to succeed.

4

Brute force can only occur online.

95

Multiple Choice

While analyzing the network, we notice aggressive traffic

in the ICMP protocol. Which of the following attacks could

be the cause?

1

Ping Flood

2

Brute force

3

SQLi

4

XSS

96

Multiple Choice

As an SOC analyst, Tom is suspicious that an On Path attack is

underway. Which of the following traffic protocols should Tom

investigate?

1

ICMP

2

POP3

3

ARP

4

IPv6

97

Multiple Choice

Which of the following refers to a situation in which computers

in an organization are redirected to false websites?

1

SQLi

2

XSS

3

DDoS

4

DNS Spoofing

98

media

99

Multiple Choice

Which property of information security does encryption support?

1

Sustainability

2

Integrity

3

Confidentiality

4

Availability

100

Multiple Choice

Which of the following encryption algorithms is the strongest?

1

AES

2

CES

3

DES

4

3DES

101

Multiple Choice

Which statement about digitally signing a document is true?

1

The document is hashed, and then the document is encrypted

with a private key.

2

The document is hashed, and then the hash is encrypted with

a private key.

3

The document is encrypted, and then the document is hashed

with a public key.

4

The document is hashed, and then the document is encrypted

with a public key.

102

Multiple Choice

Which of the following hash algorithms is the weakest?

1

SHA-512

2

RSA 4096

3

SHA-1

4

SHA-256

103

Multiple Choice

Which definition of a fork in Linux is true?

1

Daemon to execute scheduled commands

2

Parent directory name of a file path name

3

Macros for manipulating CPU sets

4

New process created by a parent process

104

Multiple Select

Which two actions are valid uses of public key infrastructure?

(Choose two.)

1

Ensuring the privacy of a certificate

2

Revoking the validation of a certificate

3

Validating the authenticity of a certificate

4

Creating duplicate copies of a certificate

5

Changing ownership of a certificate

105

Multiple Choice

In which of the following cases should an employee

return his laptop to the organization?

1

When changing to a different role

2

Upon termination of employment

3

As described in the asset return policy

4

When the lease for the laptop expires

106

Multiple Choice

What is a trunk link used for?

1

To transfer traffic of multiple virtual LANs

2

To connect more than two switches

3

To enable the Spanning Tree Protocol

4

To encapsulate Layer 2 frames

107

Multiple Choice

At which OSI layer does a router typically operate?

1

Transport

2

Network

3

Data link

4

Application

108

Multiple Choice

Cisco pxGrid has a unified framework with an open API designed in

a hub and spoke architecture. pxGrid is used to enable the sharing

of contextual-based information from which devices?

1

From a Cisco ASA to the Cisco OpenDNS service

2

From a Cisco ASA to the Cisco WSA

3

From a Cisco ASA to the Cisco FMC

4

From a Cisco ISE session directory to other policy network

systems, such as Cisco IOS devices and the Cisco ASA

109

Multiple Select

Which of the following answers relate to the preparation phase?

(Choose more than one.)

1

Smartphones that are available for emergency communication

2

Communication and coordination mechanisms in case of the

failure of one mechanism

3

A secure storage facility

4

None of the above

110

media
media

Show answer

Auto Play

Slide 1 / 110

SLIDE