Exam 3: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which two components reduce the attack surface on an endpoint? (Choose two.)

(Multiple Choice)
4.7/5
(27)

Which event is user interaction?

(Multiple Choice)
4.9/5
(39)

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?

(Multiple Choice)
4.9/5
(21)

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification. Which information is available on the server certificate?

(Multiple Choice)
4.9/5
(29)

Which evasion technique is a function of ransomware?

(Multiple Choice)
4.8/5
(35)

  Refer to the exhibit. Which technology generates this log? Refer to the exhibit. Which technology generates this log?

(Multiple Choice)
4.7/5
(32)

Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?

(Multiple Choice)
4.8/5
(41)

How is attacking a vulnerability categorized?

(Multiple Choice)
4.8/5
(42)

  Refer to the exhibit. Which packet contains a file that is extractable within Wireshark? Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?

(Multiple Choice)
4.8/5
(39)

What does an attacker use to determine which network ports are listening on a potential target device?

(Multiple Choice)
4.9/5
(36)

At which layer is deep packet inspection investigated on a firewall?

(Multiple Choice)
4.8/5
(39)

Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?

(Multiple Choice)
4.9/5
(44)

  Refer to the exhibit. What is depicted in the exhibit? Refer to the exhibit. What is depicted in the exhibit?

(Multiple Choice)
4.9/5
(40)

Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)

(Multiple Choice)
4.8/5
(33)

What is the virtual address space for a Windows process?

(Multiple Choice)
4.8/5
(43)

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack. What is the reason for this discrepancy?

(Multiple Choice)
4.8/5
(32)

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?

(Multiple Choice)
4.9/5
(33)

  Refer to the exhibit. Which type of log is displayed? Refer to the exhibit. Which type of log is displayed?

(Multiple Choice)
4.9/5
(38)

A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs. Which technology should be used to accomplish this task?

(Multiple Choice)
4.8/5
(41)

What is a difference between inline traffic interrogation and traffic mirroring?

(Multiple Choice)
4.9/5
(40)
Showing 41 - 60 of 141
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)