Time limit: 0
Quiz-summary
0 of 27 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
Information
CCNA Cyber Ops (Version 1.1) – Chapter 10 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 27 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- Answered
- Review
-
Question 1 of 27
1. Question
1 pointsIn most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?Correct
Incorrect
-
Question 2 of 27
2. Question
1 pointsOn a Windows host, which tool can be used to create and maintain blacklists and whitelists?Correct
Incorrect
-
Question 3 of 27
3. Question
1 pointsWhich statement describes agentless antivirus protection?Correct
Incorrect
-
Question 4 of 27
4. Question
1 pointsIn network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?Correct
Incorrect
-
Question 5 of 27
5. Question
1 pointsThe IT security personnel of an organization notice that the web server deployed in the DMZ is frequently targeted by threat actors. The decision is made to implement a patch management system to manage the server. Which risk management strategy method is being used to respond to the identified risk?Correct
Incorrect
-
Question 6 of 27
6. Question
1 pointsIn addressing a risk that has low potential impact and relatively high cost of mitigation or reduction, which strategy will accept the risk and its consequences?Correct
Incorrect
-
Question 7 of 27
7. Question
1 pointsWhat is a host-based intrusion detection system (HIDS)?Correct
Incorrect
-
Question 8 of 27
8. Question
1 pointsWhat type of antimalware program is able to detect viruses by recognizing various characteristics of a known malware file?Correct
Incorrect
-
Question 9 of 27
9. Question
1 pointsWhich device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?Correct
Incorrect
-
Question 10 of 27
10. Question
1 pointsWhich criterion in the Base Metric Group Exploitability metrics reflects the proximity of the threat actor to the vulnerable component?Correct
Incorrect
-
Question 11 of 27
11. Question
1 pointsIn addressing an identified risk, which strategy aims to stop performing the activities that create risk?Correct
Incorrect
-
Question 12 of 27
12. Question
1 pointsWhich statement describes the term iptables?Correct
Incorrect
-
Question 13 of 27
13. Question
1 pointsFor network systems, which management system addresses the inventory and control of hardware and software configurations?Correct
Incorrect
-
Question 14 of 27
14. Question
1 pointsWhich statement describes the anomaly-based intrusion detection approach?Correct
Incorrect
-
Question 15 of 27
15. Question
1 pointsWhat is the first step taken in risk assessment?Correct
Incorrect
-
Question 16 of 27
16. Question
1 pointsWhich statement describes the threat-vulnerability (T-V) pairing?Correct
Incorrect
-
Question 17 of 27
17. Question
1 pointsWhich security procedure would be used on a Windows workstation to prevent access to a specific set of websites?Correct
Incorrect
-
Question 18 of 27
18. Question
1 pointsWhich statement describes the use of a Network Admission Control (NAC) solution?Correct
Incorrect
-
Question 19 of 27
19. Question
1 pointsWhich statement describes the Cisco Threat Grid Glovebox?Correct
Incorrect
-
Question 20 of 27
20. Question
1 pointsWhich type of antimalware software detects and mitigates malware by analyzing suspicious activities?Correct
Incorrect
-
Question 21 of 27
21. Question
1 pointsWhich regulatory compliance regulation sets requirements for all U.S. public company boards, management and public accounting firms regarding the way in which corporations control and disclose financial information?Correct
Incorrect
-
Question 22 of 27
22. Question
1 pointsWhich regulatory compliance regulation sets requirements for all U.S. public company boards, management and public accounting firms regarding the way in which corporations control and disclose financial information?Correct
Incorrect
-
Question 23 of 27
23. Question
1 pointsWhich statement describes the term attack surface?Correct
Incorrect
-
Question 24 of 27
24. Question
1 pointsWhich step in the Vulnerability Management Life Cycle determines a baseline risk profile to eliminate risks based on asset criticality, vulnerability threat, and asset classification?Correct
Incorrect
-
Question 25 of 27
25. Question
1 pointsWhen a network baseline is being established for an organization, which network profile element indicates the time between the establishment of a data flow and its termination?Correct
Incorrect
-
Question 26 of 27
26. Question
1 pointsWhich two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)Correct
Incorrect
-
Question 27 of 27
27. Question
1 pointsWhich two criteria in the Base Metric Group Exploitability metrics are associated with the complexity of attacks? (Choose two)Correct
Incorrect