Exam 3: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are two denial of service attacks? (Choose two.)

(Multiple Choice)
4.8/5
(37)

A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?

(Multiple Choice)
4.7/5
(42)

  Refer to the exhibit. What should be interpreted from this packet capture? Refer to the exhibit. What should be interpreted from this packet capture?

(Multiple Choice)
4.8/5
(36)

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?

(Multiple Choice)
4.9/5
(29)

Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?

(Multiple Choice)
4.7/5
(35)

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

(Multiple Choice)
4.9/5
(34)

  Refer to the exhibit. What is the expected result when the Allow subdissector to reassemble TCP streams feature is enabled? Refer to the exhibit. What is the expected result when the "Allow subdissector to reassemble TCP streams" feature is enabled?

(Multiple Choice)
4.8/5
(28)

What is a sandbox interprocess communication service?

(Multiple Choice)
4.8/5
(24)

An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?

(Multiple Choice)
4.9/5
(40)

What are two social engineering techniques? (Choose two.)

(Multiple Choice)
4.8/5
(33)

An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?

(Multiple Choice)
4.9/5
(39)

What is an attack surface as compared to a vulnerability?

(Multiple Choice)
4.8/5
(37)

  Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard? Refer to the exhibit. What is the potential threat identified in this Stealthwatch dashboard?

(Multiple Choice)
4.8/5
(32)

Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?

(Multiple Choice)
4.7/5
(46)

  Refer to the exhibit. This request was sent to a web application server driven by a database. Which type of web server attack is represented? Refer to the exhibit. This request was sent to a web application server driven by a database. Which type of web server attack is represented?

(Multiple Choice)
4.9/5
(26)

A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?

(Multiple Choice)
4.7/5
(32)

Which step in the incident response process researches an attacking host through logs in a SIEM?

(Multiple Choice)
4.8/5
(40)

  Refer to the exhibit. What information is depicted? Refer to the exhibit. What information is depicted?

(Multiple Choice)
4.7/5
(36)

Which piece of information is needed for attribution in an investigation?

(Multiple Choice)
4.9/5
(30)

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?

(Multiple Choice)
4.9/5
(39)
Showing 121 - 140 of 141
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)