Search Header Logo

CyberOps Modules 24-25

Authored by Logan Prewitt

Computers

12th Grade

Used 5+ times

CyberOps Modules 24-25
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. Which ICMP message type should be stopped inbound?

  • source quench

  • echo-reply

echo

  • unreachable

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. How can IMAP be a security threat to a company?

  • Someone inadvertently clicks on a hidden iFrame.

  • Encrypted data is decrypted.

An email can be used to bring malware to a host.

  • It can be used to encode stolen data and send to a threat actor.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

3. Which two technologies are primarily used on peer-to-peer networks? (Choose two.)


Bitcoin

BitTorrent

  • Wireshark

  • Darknet

  • Snort

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which protocol is exploited by cybercriminals who create malicious iFrames?


HTTP

  • ARP

  • DHCP

  • DNS

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • UDP infiltration

ICMP tunneling

  • HTTPS traffic encryption

  • iFrame injection

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

6. Why does HTTPS technology add complexity to network security monitoring?

  • HTTPS dynamically changes the port number on the web server.

  • HTTPS uses tunneling technology for confidentiality.

  • HTTPS hides the true source IP address using NAT/PAT.

HTTPS conceals data traffic through end-to-end encryption.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

7. Which approach is intended to prevent exploits that target syslog?

  • Use a Linux-based server.

Use syslog-ng.

  • Create an ACL that permits only TCP traffic to the syslog server.

  • Use a VPN between a syslog client and the syslog server.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?