Time limit: 0
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
CCNA Cyber Ops (Version 1.1) – Chapter 13 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
1 pointsWhen dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations of a system? (Choose two.)Correct
Incorrect
-
Question 2 of 25
2. Question
1 pointsWhich action should be included in a plan element that is part of a computer security incident response capability (CSIRC)?Correct
Incorrect
-
Question 3 of 25
3. Question
1 pointsWhat is the objective the threat actor in establishing a two-way communication channel between the target system and a CnC infrastructure?Correct
Incorrect
-
Question 4 of 25
4. Question
1 pointsAfter containment, what is the first step of eradicating an attack?Correct
Incorrect
-
Question 5 of 25
5. Question
1 pointsWhat is defined in the SOP of a computer security incident response capability (CSIRC)?Correct
Incorrect
-
Question 6 of 25
6. Question
1 pointsA school has a web server mainly used for parents to view school events, access student performance indicators, and communicate with teachers. The network administrator suspects a security-related event has occurred and is reviewing what steps should be taken. The threat actor has already placed malware on the server causing its performance to slow. The network administrator has found and removed the malware as well as patched the security hole where the threat actor gained access. The network administrator can find no other security issue. What stage of the Cyber Kill Chain did the threat actor achieve?Correct
Incorrect
-
Question 7 of 25
7. Question
1 pointsA school has a web server mainly used for parents to view school events, access student performance indicators, and communicate with teachers. The network administrator suspects a security-related event has occurred and is reviewing what steps should be taken. If the web server runs Microsoft IIS, which Windows tool would the network administrator use to view the access logs?Correct
Incorrect
-
Question 8 of 25
8. Question
1 pointsA school has a web server mainly used for parents to view school events, access student performance indicators, and communicate with teachers. The network administrator suspects a security-related event has occurred and is reviewing what steps should be taken. Reports of network slowness lead the network administrator to review server alerts. The administrator confirms that an alert was an actual security incident. Which type of security alert classification would this be?Correct
Incorrect
-
Question 9 of 25
9. Question
1 pointsA school has a web server mainly used for parents to view school events, access student performance indicators, and communicate with teachers. The network administrator suspects a security-related event has occurred and is reviewing what steps should be taken. The network administrator believes that the threat actor used a commonly available tool to slow the server down. The administrator concludes that based on the source IP address identified in the alert, the threat actor was probably one of the students. What type of hacker would the student be classified as?Correct
Incorrect
-
Question 10 of 25
10. Question
1 pointsWhat is the goal of an attack in the installation phase of the Cyber Kill Chain?Correct
Incorrect
-
Question 11 of 25
11. Question
1 pointsWhich meta-feature element in the Diamond Model describes information gained by the adversary?Correct
Incorrect
-
Question 12 of 25
12. Question
1 pointsWhat is a benefit of using the VERIS community database?Correct
Incorrect
-
Question 13 of 25
13. Question
1 pointsWhen a security attack has occurred, which two approaches should security professionals take to mitigate a compromised system during the Actions on Objectives step as defined by the Cyber Kill Chain model? (Choose two.)Correct
Incorrect
-
Question 14 of 25
14. Question
1 pointsA threat actor has identified the potential vulnerability of the web server of an organization and is building an attack. What will the threat actor possibly do to build an attack weapon?Correct
Incorrect
-
Question 15 of 25
15. Question
1 pointsWhich action is taken in the postincident phase of the NIST incident response life cycle?Correct
Incorrect
-
Question 16 of 25
16. Question
1 pointsWhich top-level element of the VERIS schema would allow a company to log who the actors were, what actions affected the asset, which assets were affected, and how the asset was affected?Correct
Incorrect
-
Question 17 of 25
17. Question
1 pointsWhat is the role of vendor teams as they relate to CSIRT?Correct
Incorrect
-
Question 18 of 25
18. Question
1 pointsAccording to information outlined by the Cyber Kill Chain, which two approaches can help identify reconnaissance threats? (Choose two.)Correct
Incorrect
-
Question 19 of 25
19. Question
1 pointsTo ensure that the chain of custody is maintained, what three items should be logged about evidence that is collected and analyzed after a security incident has occurred? (Choose three.)Correct
Incorrect
-
Question 20 of 25
20. Question
1 pointsWhich schema or model was created to anonymously share quality information about security events to the security community?Correct
Incorrect
-
Question 21 of 25
21. Question
1 pointsWhat is the purpose of the policy element in a computer security incident response capability of an organization, as recommended by NIST?Correct
Incorrect
-
Question 22 of 25
22. Question
1 pointsWhat information is gathered by the CSIRT when determining the scope of a security incident?Correct
Incorrect
-
Question 23 of 25
23. Question
1 pointsWhat is the main purpose of exploitations by a threat actor through the weapon delivered to a target during the Cyber Kill Chain exploitation phase?Correct
Incorrect
-
Question 24 of 25
24. Question
1 pointsWhich term is used in the Diamond Model of intrusion to describe a tool that a threat actor uses toward a target system?Correct
Incorrect
-
Question 25 of 25
25. Question
1 pointsWhat is the role of a Computer Emergency Response Team?Correct
Incorrect