CyberOps Modules 24-25

CyberOps Modules 24-25

12th Grade

35 Qs

quiz-placeholder

Similar activities

Administrasi Infrastruktur Jaringan (Firewall)

Administrasi Infrastruktur Jaringan (Firewall)

12th Grade

40 Qs

Cisco - Networking Devices and Initial Config - Mod 9 P1 Test

Cisco - Networking Devices and Initial Config - Mod 9 P1 Test

12th Grade

37 Qs

CyberOps Chapter 24-25 Review

CyberOps Chapter 24-25 Review

9th - 12th Grade

32 Qs

System Monitoring Tools Quiz

System Monitoring Tools Quiz

12th Grade - University

40 Qs

QUIZ 2 SAM

QUIZ 2 SAM

12th Grade

40 Qs

DNS & AD

DNS & AD

11th - 12th Grade

30 Qs

TestOut Quiz DLP P/Q

TestOut Quiz DLP P/Q

11th Grade - University

34 Qs

J277 Networks

J277 Networks

12th Grade

34 Qs

CyberOps Modules 24-25

CyberOps Modules 24-25

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Logan Prewitt

Used 5+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. Which ICMP message type should be stopped inbound?

  • source quench

  • echo-reply

echo

  • unreachable

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. How can IMAP be a security threat to a company?

  • Someone inadvertently clicks on a hidden iFrame.

  • Encrypted data is decrypted.

An email can be used to bring malware to a host.

  • It can be used to encode stolen data and send to a threat actor.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

3. Which two technologies are primarily used on peer-to-peer networks? (Choose two.)


Bitcoin

BitTorrent

  • Wireshark

  • Darknet

  • Snort

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which protocol is exploited by cybercriminals who create malicious iFrames?


HTTP

  • ARP

  • DHCP

  • DNS

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • UDP infiltration

ICMP tunneling

  • HTTPS traffic encryption

  • iFrame injection

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

6. Why does HTTPS technology add complexity to network security monitoring?

  • HTTPS dynamically changes the port number on the web server.

  • HTTPS uses tunneling technology for confidentiality.

  • HTTPS hides the true source IP address using NAT/PAT.

HTTPS conceals data traffic through end-to-end encryption.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

7. Which approach is intended to prevent exploits that target syslog?

  • Use a Linux-based server.

Use syslog-ng.

  • Create an ACL that permits only TCP traffic to the syslog server.

  • Use a VPN between a syslog client and the syslog server.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?