Time limit: 0
Quiz-summary
0 of 29 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
Information
CCNA Cyber Ops (Version 1.1) – Chapter 11 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 29 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- Answered
- Review
-
Question 1 of 29
1. Question
1 pointsHow does using HTTPS complicate network security monitoring?Correct
Incorrect
-
Question 2 of 29
2. Question
1 pointsWhich protocol is used to send e-mail messages between two servers that are in different e-mail domains?Correct
Incorrect
-
Question 3 of 29
3. Question
1 pointsWhat are two ways that ICMP can be a security threat to a company? (Choose two.)Correct
Incorrect
-
Question 4 of 29
4. Question
1 pointsWhich function is provided by the Sguil application?Correct
Incorrect
-
Question 5 of 29
5. Question
1 pointsWhich two options are network security monitoring approaches that use advanced analytic techniques to analyze network telemetry data? (Choose two.)Correct
Incorrect
-
Question 6 of 29
6. Question
1 pointsA system administrator has recommended to the CIO a move of some applications from a Windows server to a Linux server. The proposed server will use ext4 partitions and serve as a web server, file server, and print server. The CIO is considering the recommendation, but has some questions regarding security. Which two methods does Linux use to log data in order to identify a security event? (Choose two.)Correct
Incorrect
-
Question 7 of 29
7. Question
1 pointsA system administrator has recommended to the CIO a move of some applications from a Windows server to a Linux server. The proposed server will use ext4 partitions and serve as a web server, file server, and print server. The CIO is considering the recommendation, but has some questions regarding security. What is a daemon?Correct
Incorrect
-
Question 8 of 29
8. Question
1 pointsA system administrator has recommended to the CIO a move of some applications from a Windows server to a Linux server. The proposed server will use ext4 partitions and serve as a web server, file server, and print server. The CIO is considering the recommendation, but has some questions regarding security. Because the company uses discretionary access control (DAC) for user file management, what feature would need to be supported on the server?Correct
Incorrect
-
Question 9 of 29
9. Question
1 pointsA system administrator has recommended to the CIO a move of some applications from a Windows server to a Linux server. The proposed server will use ext4 partitions and serve as a web server, file server, and print server. The CIO is considering the recommendation, but has some questions regarding security. What are two benefits of using an ext4 partition instead of ext3? (Choose two.)Correct
Incorrect
-
Question 10 of 29
10. Question
1 pointsHow can IMAP be a security threat to a company?Correct
Incorrect
-
Question 11 of 29
11. Question
1 pointsA system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do?Correct
Incorrect
-
Question 12 of 29
12. Question
1 pointsHow does a web proxy device provide data loss prevention (DLP) for an enterprise?Correct
Incorrect
-
Question 13 of 29
13. Question
1 pointsA system analyst is reviewing syslog messages and notices that the PRI value of a message is 26. What is the severity value of the message?Correct
Incorrect
-
Question 14 of 29
14. Question
1 pointsWhich statement describes session data in security logs?Correct
Incorrect
-
Question 15 of 29
15. Question
1 pointsIn a Cisco AVC system, in which module is NetFlow deployed?Correct
Incorrect
-
Question 16 of 29
16. Question
1 pointsWhat port number would be used if a threat actor was using NTP to direct DDoS attacks?Correct
Incorrect
-
Question 17 of 29
17. Question
1 pointsWhich information can be provided by the Cisco NetFlow utility?Correct
Incorrect
-
Question 18 of 29
18. Question
1 pointsWhat is Tor?Correct
Incorrect
-
Question 19 of 29
19. Question
1 pointsWhich statement describes statistical data in network security monitoring processes?Correct
Incorrect
-
Question 20 of 29
20. Question
1 pointsRefer to the exhibit. A network administrator is reviewing an Apache access log message. What is the status of the access request by the client?Correct
Incorrect
-
Question 21 of 29
21. Question
1 pointsHow might corporate IT professionals deal with DNS-based cyber threats?Correct
Incorrect
-
Question 22 of 29
22. Question
1 pointsRefer to the exhibit. A junior network engineer is handed a print-out of the network information shown. Which protocol or service originated the information shown in the graphic?Correct
Incorrect
-
Question 23 of 29
23. Question
1 pointsWhich technology is used in Cisco Next-Generation IPS devices to consolidate multiple security layers into a single platform?Correct
Incorrect
-
Question 24 of 29
24. Question
1 pointsRefer to the exhibit. How is the traffic from the client web browser being altered when connected to the destination website of www.cisco.com?Correct
Incorrect
-
Question 25 of 29
25. Question
1 pointsWhich Windows log contains information about installations of software, including Windows updates?Correct
Incorrect
-
Question 26 of 29
26. Question
1 pointsWhich Windows log records events related to login attempts and operations related to file or object access?Correct
Incorrect
-
Question 27 of 29
27. Question
1 pointsWhat does it indicate if the timestamp in the HEADER section of a syslog message is preceded by a period or asterisk symbol?Correct
Incorrect
-
Question 28 of 29
28. Question
1 pointsWhich two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.)Correct
Incorrect
-
Question 29 of 29
29. Question
1 pointsWhich protocol is a name resolution protocol often used by malware to communicate with command-and-control (CnC) servers?Correct
Incorrect