Search Header Logo

MCyber_Chap20N21

Authored by Marcus Phang

Information Technology (IT)

Professional Development

Used 3+ times

MCyber_Chap20N21
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of security data can be used to describe or predict network behavior?

Alert
Session
Statistical
Transaction

Answer explanation

Statistical data is created through the analysis of other forms of network data.

Conclusions from these analyses can be used to describe or predict network behavior.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Windows tool can be used to review host logs?

Services
Event Viewer
Task Manager
Device Manager

Answer explanation

Event Viewer in Windows can be used to review entries in various logs.

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are two popular SIEM platforms? (Choose two.)

Splunk
Netflow
Tcpdump
Cisco Umbrella
Security Onion with ELK

Answer explanation

Security Information and Event Management (SIEM) is a technology that provides real-time reporting and long-term analysis of security events.

Two SIEM platforms used by organizations are Splunk and Security Onion with ELK.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a feature of the tcpdump tool?

It records metadata about packet flows.
It uses agents to submit host logs to centralized management servers.
It can display packet captures in real time or write them to a file.
It provides real-time reporting and long-term analysis of security events.

Answer explanation

The tcpdump command line tool is a packet analyzer that captures detailed packet protocol and content data.

It can display packet captures in real time or write them to a file.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of data is used by Cisco Cognitive Intelligence to find malicious activity that has bypassed security controls, or entered through unmonitored channels, and is operating inside an enterprise network?

Statistical
Session
Alert
Transaction

Answer explanation

Cisco Cognitive Intelligence utilizes statistical data for statistical analysis in order to find malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside the network of an organization.

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are two of the 5-tuples? (Choose two.)

IPS
Source port
IDS
ACL
Protocol

Answer explanation

The components of a 5-tuple include a

1) Source IP address,


2) Port number,

3) Destination IP address ,

4) Port number,

5) Protocol in use.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement describes the tcpdump tool?

It is a command line packet analyzer.
It is used to control multiple TCP-based applications
It accepts and analyzes data captured by Wireshark.
It can be used to analyze network log data in order to describe and predict network behavior.

Answer explanation

The tcpdump command line tool is a popular packet analyzer.

It can display packet captures in real time or write packet captures to a file.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?