Exam 3: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

  Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.) Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.)

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D,E

What is the difference between statistical detection and rule-based detection models?

Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
Verified

B

Which metric is used to capture the level of access needed to launch a successful attack?

Free
(Multiple Choice)
5.0/5
(40)
Correct Answer:
Verified

A

An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?

(Multiple Choice)
4.8/5
(30)

What makes HTTPS traffic difficult to monitor?

(Multiple Choice)
5.0/5
(35)

What is personally identifiable information that must be safeguarded from unauthorized access?

(Multiple Choice)
4.8/5
(34)

An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?

(Multiple Choice)
4.8/5
(33)

Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)

(Multiple Choice)
4.7/5
(32)

Which incidence response step includes identifying all hosts affected by an attack?

(Multiple Choice)
4.7/5
(43)

A user received a malicious attachment but did not run it. Which category classifies the intrusion?

(Multiple Choice)
4.8/5
(41)

Which HTTP header field is used in forensics to identify the type of browser used?

(Multiple Choice)
4.7/5
(27)

  Refer to the exhibit. What does this output indicate? Refer to the exhibit. What does this output indicate?

(Multiple Choice)
4.8/5
(26)

What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?

(Multiple Choice)
4.9/5
(31)

  Refer to the exhibit. In which Linux log file is this output found? Refer to the exhibit. In which Linux log file is this output found?

(Multiple Choice)
4.9/5
(40)

What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)

(Multiple Choice)
4.9/5
(42)

How does an attacker observe network traffic exchanged between two users?

(Multiple Choice)
4.9/5
(36)

Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?

(Multiple Choice)
4.9/5
(32)

An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?

(Multiple Choice)
4.7/5
(37)

Which artifact is used to uniquely identify a detected file?

(Multiple Choice)
4.9/5
(25)

What is the relationship between a vulnerability and a threat?

(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 141
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)