Exam 3: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A malicious file has been identified in a sandbox analysis tool. Which piece of information is needed to search for additional downloads of this file by other hosts?

(Multiple Choice)
4.8/5
(35)

What causes events on a Windows system to show Event Code 4625 in the log messages?

(Multiple Choice)
4.8/5
(33)

Which security principle is violated by running all processes as root or administrator?

(Multiple Choice)
4.8/5
(32)

An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?

(Multiple Choice)
4.8/5
(41)

Which action prevents buffer overflow attacks?

(Multiple Choice)
4.9/5
(25)

What is the impact of false positive alerts on business compared to true positive?

(Multiple Choice)
4.9/5
(43)

  Refer to the exhibit. What is occurring in this network? Refer to the exhibit. What is occurring in this network?

(Multiple Choice)
4.9/5
(34)

What is the function of a command and control server?

(Multiple Choice)
4.9/5
(40)

Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?

(Multiple Choice)
4.8/5
(33)

In a SOC environment, what is a vulnerability management metric?

(Multiple Choice)
4.7/5
(29)

What is a difference between SOAR and SIEM?

(Multiple Choice)
4.8/5
(39)

An analyst is exploring the functionality of different operating systems. What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?

(Multiple Choice)
4.9/5
(37)

Which system monitors local system operation and local network access for violations of a security policy?

(Multiple Choice)
4.9/5
(29)

What does cyber attribution identity in an investigation?

(Multiple Choice)
4.8/5
(23)

What is an attack surface as compared to a vulnerability?

(Multiple Choice)
4.8/5
(30)

Which event artifact is used to identity HTTP GET requests for a specific file?

(Multiple Choice)
4.8/5
(44)

What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?

(Multiple Choice)
4.8/5
(32)

An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?

(Multiple Choice)
4.8/5
(38)

A system administrator is ensuring that specific registry information is accurate. Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?

(Multiple Choice)
4.8/5
(30)

Which type of data consists of connection level, application-specific records generated from network traffic?

(Multiple Choice)
4.8/5
(34)
Showing 101 - 120 of 141
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)