CyberOps Chapter 24-25 Review

CyberOps Chapter 24-25 Review

9th - 12th Grade

32 Qs

quiz-placeholder

Similar activities

C N+ U15 Network Monitoring, Patching & Hardening

C N+ U15 Network Monitoring, Patching & Hardening

10th Grade

27 Qs

CyberOps Modules 24-25

CyberOps Modules 24-25

12th Grade

35 Qs

Unit 6 Exam Part 2

Unit 6 Exam Part 2

12th Grade

33 Qs

98-367 PT4

98-367 PT4

8th - 12th Grade

27 Qs

Network Topologies (Mr I's) [OCR 1.5 - Networks)

Network Topologies (Mr I's) [OCR 1.5 - Networks)

9th - 11th Grade

27 Qs

Module 7 Pre-Assessment

Module 7 Pre-Assessment

11th Grade

30 Qs

Networking Basics

Networking Basics

9th - 12th Grade

32 Qs

DHCP Server

DHCP Server

12th Grade

29 Qs

CyberOps Chapter 24-25 Review

CyberOps Chapter 24-25 Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Jeremy 2024

Used 5+ times

FREE Resource

32 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 3 pts

Media Image

What three types of ICMP traffic should be allowed to access an internal network from the internet (Select Three)

Squelch

Destination Unreachable

Request

Reply

Time Exceeded

Answer explanation

ACLs should only permit special types of ICMP messages to enter an internal network. Allowed ICMP traffic includes an ICMP reply, source quench, and any ICMP unreachable messages. All other ICMP traffic types should be denied.

2.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Media Image

Alert Data consists of which two (Select Two)

Intrusion Detection System (IDS)

Network Intrusion Detection Syestem (NIDS)

Host-Based Intrusion Detection System (HIDS)

Intrusion Prevention System (IPS)

Answer explanation

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks

HTTPS traffic can carry a much larger payload than HTTP can carry

HTTPS traffic enabled end-to-end encryption

HTTPS does not require authentication

HTTPS traffic is much faster than HTTP traffic

Answer explanation

HTTPS enables end-to-end encrypted network communication, which adds further challenges for network administrators to monitor the content of packets to catch malicious attacks.

4.

FILL IN THE BLANK QUESTION

45 sec • 3 pts

Media Image

What type of server can threat actors use DNS to communicate with?

Answer explanation

Some malware uses DNS to communicate with command-and-control (CnC) servers to exfiltrate data in traffic that is disguised as normal DNS query traffic.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What uses a server deamon that accepts messages and creates a collection of logs

AAA

SSH

WIndows Host Log Events

syslog

Answer explanation

Syslog is important to security monitoring because network devices send periodic messages to the syslog server. These logs can be examined to detect inconsistencies and issues within the network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How are iFrames used by cybercriminals

The iFrame allows multiple DNS subdomains to be used

The iFrame allows the browser to load a webpage from another source

To become invincible for a moment then demolish the enemy

The attacker embeds malicous content in business apropriate files

the attacker redirects traffic to an incorrect DNS server

Answer explanation

An inline frame or iFrame is an HTML element that allows the browser to load a different web page from another source.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can NAT/PAT complicate network security monitoring if NetFlow is being used?

Disguises the application initiated by a user by manipulating port numbers.

It hides internal IP addresses by allowing them to share one or a few outside IP addresses.

It conceals the contents of a packet by encrypting the data payload.

It changes the source and destination MAC addresses.

Answer explanation

NAT/PAT maps multiple internal IP addresses with only a single or a few outside IP addresses breaking end-to-end flows. The result makes it difficult to log the inside device that is requesting and receiving the traffic. This is especially a problem with a NetFlow application because NetFlow flows are unidirectional and are defined by the addresses and ports that they share.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?