Author: IT Administrator
1. A network technician receives a call from a use who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user …
Target Audience The Cisco CCNA® curriculum is designed for Cisco Networking Academy® participants who are seeking entry-level jobs in the ICT industry or hope to fulfill prerequisites to pursue more specialized ICT skills. CCNA provides an integrated and comprehensive coverage of networking topics including; IP fundamentals, network security …
1. Refer to the exhibit. A network security specialist issues the command tcpdump to capture events. What does the number 6337 indicate? the number of transactions currently captured the process id of the tcpdump command the port that tcpdump is listening to the Snort signature id that tcpdump …
CCNA Cybersecurity Operations (Version 1.1) – CyberOps Practice Final Exam 1. A person coming to a cafe for the first time wants to gain wireless access to the Internet using a laptop. What is the first step the wireless client will do in order to communicate over the …
1. In the NIST incident response process life cycle, which type of attack vector involves the use of brute force against devices, networks, or services? Media Impersonation Attrition Loss or theft 2. Which NIST incident response life cycle phase includes continuous monitoring by the CSIRT to quickly identify …
1. Which two technologies are used in the ELSA tool? (Choose two.) MySQL * CapME Suricata Sphinx Search * Security Onion 2. What is the host-based intrusion detection tool that is integrated into Security Onion? OSSEC * Snort Sguil Wireshark 3. According to NIST, which step in the …
1. Which statement describes the tcpdump tool? It is a command line packet analyzer. It is used to control multiple TCP-based applications. It accepts and analyzes data captured by Wireshark. It can be used to analyze network log data in order to describe and predict network behavior. 2. …
1. Which HIDS is an open source product? Tripwire OSSEC * Cisco AMP AlienVault USM 2. In Windows Firewall, when is the Domain profile applied? When the host accesses the Internet When the host checks emails from an enterprise email server When the host is connected to a …
1. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? DH A private key A digital certificate A different public key 2. Which type of attack does the use of HMACs protect against? DoS DDoS Brute force Man-in-the-middle 3. Which …
1. With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Artichoke * Lettuce Onion Cabbage 2. What is a characteristic of a layered defense-in-depth security approach? Three or more devices are used. Routers are replaced with firewalls. When one device fails, …