Exam 3: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a purpose of a vulnerability management framework?

(Multiple Choice)
4.9/5
(29)

How does an SSL certificate impact security between the client and the server?

(Multiple Choice)
4.8/5
(39)

What is the difference between a threat and a risk?

(Multiple Choice)
4.9/5
(31)

Which signature impacts network traffic by causing legitimate traffic to be blocked?

(Multiple Choice)
4.8/5
(33)

One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

(Multiple Choice)
4.9/5
(29)

  Refer to the exhibit. Which application protocol is in this PCAP file? Refer to the exhibit. Which application protocol is in this PCAP file?

(Multiple Choice)
4.9/5
(25)

What is the difference between the rule-based detection when compared to behavioral detection?

(Multiple Choice)
4.9/5
(43)

  Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139? Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139?

(Multiple Choice)
4.9/5
(33)

Which utility blocks a host portscan?

(Multiple Choice)
4.7/5
(40)

What is the difference between an attack vector and attack surface?

(Multiple Choice)
4.9/5
(45)

What are the two characteristics of the full packet captures? (Choose two.)

(Multiple Choice)
4.8/5
(40)

Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?

(Multiple Choice)
5.0/5
(34)

Which security technology guarantees the integrity and authenticity of all messages transferred to and from a web application?

(Multiple Choice)
4.9/5
(35)

What is the principle of defense-in-depth?

(Multiple Choice)
4.9/5
(37)

Which regular expression matches "color" and "colour"?

(Multiple Choice)
4.8/5
(40)

Which type of data collection requires the largest amount of storage space?

(Multiple Choice)
4.8/5
(36)

How is NetFlow different than traffic mirroring?

(Multiple Choice)
4.9/5
(35)

What is the practice of giving an employee access to only the resources needed to accomplish their job?

(Multiple Choice)
4.8/5
(29)

Which two elements are used for profiling a network? (Choose two.)

(Multiple Choice)
4.7/5
(27)

  Refer to the exhibit. What is occurring in this network traffic? Refer to the exhibit. What is occurring in this network traffic?

(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 141
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)