Time limit: 0
Quiz-summary
0 of 40 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
Information
CCNA Cyber Ops (Version 1.1) – Chapter 10 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 40 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- Answered
- Review
-
Question 1 of 40
1. Question
1 pointsIn most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?Correct
Incorrect
-
Question 2 of 40
2. Question
1 pointsOn a Windows host, which tool can be used to create and maintain blacklists and whitelists?Correct
Incorrect
-
Question 3 of 40
3. Question
1 pointsWhich statement describes agentless antivirus protection?Correct
Incorrect
-
Question 4 of 40
4. Question
1 pointsIn network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?Correct
Incorrect
-
Question 5 of 40
5. Question
1 pointsThe IT security personnel of an organization notice that the web server deployed in the DMZ is frequently targeted by threat actors. The decision is made to implement a patch management system to manage the server. Which risk management strategy method is being used to respond to the identified risk?Correct
Incorrect
-
Question 6 of 40
6. Question
1 pointsIn addressing a risk that has low potential impact and relatively high cost of mitigation or reduction, which strategy will accept the risk and its consequences?Correct
Incorrect
-
Question 7 of 40
7. Question
1 pointsWhat is a host-based intrusion detection system (HIDS)?Correct
Incorrect
-
Question 8 of 40
8. Question
1 pointsWhat type of antimalware program is able to detect viruses by recognizing various characteristics of a known malware file?Correct
Incorrect
-
Question 9 of 40
9. Question
1 pointsWhich device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?Correct
Incorrect
-
Question 10 of 40
10. Question
1 pointsWhich criterion in the Base Metric Group Exploitability metrics reflects the proximity of the threat actor to the vulnerable component?Correct
Incorrect
-
Question 11 of 40
11. Question
1 pointsIn addressing an identified risk, which strategy aims to stop performing the activities that create risk?Correct
Incorrect
-
Question 12 of 40
12. Question
1 pointsWhich statement describes the term iptables?Correct
Incorrect
-
Question 13 of 40
13. Question
1 pointsFor network systems, which management system addresses the inventory and control of hardware and software configurations?Correct
Incorrect
-
Question 14 of 40
14. Question
1 pointsWhich statement describes the anomaly-based intrusion detection approach?Correct
Incorrect
-
Question 15 of 40
15. Question
1 pointsWhat is the first step taken in risk assessment?Correct
Incorrect
-
Question 16 of 40
16. Question
1 pointsWhich statement describes the threat-vulnerability (T-V) pairing?Correct
Incorrect
-
Question 17 of 40
17. Question
1 pointsWhich security procedure would be used on a Windows workstation to prevent access to a specific set of websites?Correct
Incorrect
-
Question 18 of 40
18. Question
1 pointsWhich statement describes the use of a Network Admission Control (NAC) solution?Correct
Incorrect
-
Question 19 of 40
19. Question
1 pointsWhich statement describes the Cisco Threat Grid Glovebox?Correct
Incorrect
-
Question 20 of 40
20. Question
1 pointsWhich type of antimalware software detects and mitigates malware by analyzing suspicious activities?Correct
Incorrect
-
Question 21 of 40
21. Question
1 pointsWhich regulatory compliance regulation sets requirements for all U.S. public company boards, management and public accounting firms regarding the way in which corporations control and disclose financial information?Correct
Incorrect
-
Question 22 of 40
22. Question
1 pointsWhich HIDS is an open source product?Correct
Incorrect
-
Question 23 of 40
23. Question
1 pointsWhich statement describes the term attack surface?Correct
Incorrect
-
Question 24 of 40
24. Question
1 pointsWhich step in the Vulnerability Management Life Cycle determines a baseline risk profile to eliminate risks based on asset criticality, vulnerability threat, and asset classification?Correct
Incorrect
-
Question 25 of 40
25. Question
1 pointsWhen a network baseline is being established for an organization, which network profile element indicates the time between the establishment of a data flow and its termination?Correct
Incorrect
-
Question 26 of 40
26. Question
1 pointsWhich two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)Correct
Incorrect
-
Question 27 of 40
27. Question
1 pointsWhich two criteria in the Base Metric Group Exploitability metrics are associated with the complexity of attacks? (Choose two)Correct
Incorrect
-
Question 28 of 40
28. Question
1 pointsIn Windows Firewall, when is the Domain profile applied?Correct
Incorrect
-
Question 29 of 40
29. Question
1 pointsWhich function does CVSS provide?Correct
Incorrect
-
Question 30 of 40
30. Question
1 pointsIn addressing an identified risk, which strategy aims to decrease the risk by taking measures to reduce vulnerability?Correct
Incorrect
-
Question 31 of 40
31. Question
1 pointsWhich regulatory compliance regulation specifies security standards for U.S.government systems and contractors to the U.S. government?Correct
Incorrect
-
Question 32 of 40
32. Question
1 pointsWhich three devices are possible examples of network endpoints? (Choose three.)Correct
Incorrect
-
Question 33 of 40
33. Question
1 pointsWhich antimalware software approach can recognize various characteristics of known malware files to detect a threat?Correct
Incorrect
-
Question 34 of 40
34. Question
1 pointsAs described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?Correct
Incorrect
-
Question 35 of 40
35. Question
1 pointsIn profiling a server, what defines what an application is allowed to do or run on a server?Correct
Incorrect
-
Question 36 of 40
36. Question
1 pointsWhich class of metric in the CVSS Basic metric group defines the features ofthe exploit such as the vector, complexity, and user interaction required by the exploit?Correct
Incorrect
-
Question 37 of 40
37. Question
1 pointsWhich step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?Correct
Incorrect
-
Question 38 of 40
38. Question
1 pointsIn network security assessments, which type of test is used to evaluate the risk posed by vulnerabilities to a specific organization, including assessment of the likelihood of attacks and the impact of successful exploits on the organization?Correct
Incorrect
-
Question 39 of 40
39. Question
1 pointsMatch the network-based antimalware solution to the function. (Not all options are used.)Correct
Incorrect
-
Question 40 of 40
40. Question
1 pointsMatch the description to the antimalware approach. (Not all options are used.)Correct
Incorrect