Time limit: 0
Quiz-summary
0 of 55 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
Information
CCNA Cyber Ops (Version 1.1) – Practice Final Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 55 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- Answered
- Review
-
Question 1 of 55
1. Question
1 pointsA person coming to a cafe for the first time wants to gain wireless access to the Internet using a laptop. What is the first step the wireless client will do in order to communicate over the network using a wireless management frame?Correct
Incorrect
-
Question 2 of 55
2. Question
1 pointsRefer to the exhibit. What is a valid address on the PC for the default gateway?Correct
Incorrect
-
Question 3 of 55
3. Question
1 pointsA cybersecurity analyst believes that an attacker is announcing a forged MAC address to network hosts in an attempt to spoof the default gateway. Which command could the analyst use on the network hosts to see what MAC address the hosts are using to reach the default gateway?Correct
Incorrect
-
Question 4 of 55
4. Question
1 pointsWhich management system implements systems that track the location and configuration of networked devices and software across an enterprise?Correct
Incorrect
-
Question 5 of 55
5. Question
1 pointsRefer to the exhibit. A cybersecurity analyst is viewing packets forwarded by switch S2. What addresses will identify frames containing data sent from PCA to PCB?Correct
Incorrect
-
Question 6 of 55
6. Question
1 pointsWhich tool can be used in a Cisco AVC system to analyze and present the application analysis data into dashboard reports?Correct
Incorrect
-
Question 7 of 55
7. Question
1 pointsWhich host-based firewall uses a three-profile approach to configure the firewall functionality?Correct
Incorrect
-
Question 8 of 55
8. Question
1 pointsWhat are three functions provided by the syslog service? (Choose three.)Correct
Incorrect
-
Question 9 of 55
9. Question
1 pointsWhich method can be used to harden a device?Correct
Incorrect
-
Question 10 of 55
10. Question
1 pointsRefer to the exhibit. Which field in the Sguil event window indicates the number of times an event is detected for the same source and destination IP address?Correct
Incorrect
-
Question 11 of 55
11. Question
1 pointsA user successfully logs in to a corporate network via a VPN connection. Which part of the AAA process records that a certain user performed a specific operation at a particular date and time?Correct
Incorrect
-
Question 12 of 55
12. Question
1 pointsWhat is the responsibility of the IT support group when handling a security incident?Correct
Incorrect
-
Question 13 of 55
13. Question
1 pointsWhich Linux program is going to be used when installing an application?Correct
Incorrect
-
Question 14 of 55
14. Question
1 pointsRefer to the exhibit. Which security issue would a cybersecurity analyst use the displayed tool?Correct
Incorrect
-
Question 15 of 55
15. Question
1 pointsWhich approach is intended to prevent exploits that target syslog?Correct
Incorrect
-
Question 16 of 55
16. Question
1 pointsWhat would be the target of an SQL injection attack?Correct
Incorrect
-
Question 17 of 55
17. Question
1 pointsWhat is the result of a DHCP starvation attack?Correct
Incorrect
-
Question 18 of 55
18. Question
1 pointsUsers report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?Correct
Incorrect
-
Question 19 of 55
19. Question
1 pointsA disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?Correct
Incorrect
-
Question 20 of 55
20. Question
1 pointsWhich two technologies are primarily used on peer-to-peer networks? (Choose two.)Correct
Incorrect
-
Question 21 of 55
21. Question
1 pointsWhich value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?Correct
Incorrect
-
Question 22 of 55
22. Question
1 pointsWhat are two elements that form the PRI value in a syslog message? (Choose two.)Correct
Incorrect
-
Question 23 of 55
23. Question
1 pointsWhich term is used for describing automated queries that are useful for adding efficiency to the cyberoperations workflow?Correct
Incorrect
-
Question 24 of 55
24. Question
1 pointsRefer to the exhibit. Which IPv4 address does the PC use for sending traffic to remote networks?Correct
Incorrect
-
Question 25 of 55
25. Question
1 pointsWhich two options are security best practices that help mitigate BYOD risks? (Choose two.)Correct
Incorrect
-
Question 26 of 55
26. Question
1 pointsWhat is an essential function of SIEM?Correct
Incorrect
-
Question 27 of 55
27. Question
1 pointsWhich two statements describe the use of asymmetric algorithms? (Choose two.)Correct
Incorrect
-
Question 28 of 55
28. Question
1 pointsWhich statement describes the Cyber Kill Chain?Correct
Incorrect
-
Question 29 of 55
29. Question
1 pointsWhy does a worm pose a greater threat than a virus poses?Correct
Incorrect
-
Question 30 of 55
30. Question
1 pointsRefer to the exhibit. Approximately what percentage of the physical memory is in use on this Windows system?Correct
Incorrect
-
Question 31 of 55
31. Question
1 pointsRefer to the exhibit. A network security specialist is issuing the tail command to monitor the Snort alert in real time. Which option should be used in the command line to watch the file for changes?Correct
Incorrect
-
Question 32 of 55
32. Question
1 pointsA customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required?Correct
Incorrect
-
Question 33 of 55
33. Question
1 pointsA network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file is modified. Which aspect of secure communications is addressed by this security measure?Correct
Incorrect
-
Question 34 of 55
34. Question
1 pointsWhat is the most common use of the Diffie-Helman algorithm in communications security?Correct
Incorrect
-
Question 35 of 55
35. Question
1 pointsIn threat intelligence communications, which sharing standard is a specification for an application layer protocol that allows communication of cyberthreat intelligence over HTTPS?Correct
Incorrect
-
Question 36 of 55
36. Question
1 pointsWhich schema or model allows security professionals to enter data about a particular incident, such as victim demographics, incident description, discovery method and response, and impact assessment, and share that data with the security community anonymously?Correct
Incorrect
-
Question 37 of 55
37. Question
1 pointsWhich component in Linux is responsible for interacting directly with the device hardware?Correct
Incorrect
-
Question 38 of 55
38. Question
1 pointsA client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?Correct
Incorrect
-
Question 39 of 55
39. Question
1 pointsA PC user issues the netstat command without any options. What is displayed as the result of this command?Correct
Incorrect
-
Question 40 of 55
40. Question
1 pointsHow can statistical data be used to describe or predict network behavior?Correct
Incorrect
-
Question 41 of 55
41. Question
1 pointsA law office uses a Linux host as the firewall device for the network. The IT administrator is configuring the firewall iptables to block pings from Internet devices to the Linux host. Which iptables chain should be modified to achieve the task?Correct
Incorrect
-
Question 42 of 55
42. Question
1 pointsWhat is the main purpose of cyberwarfare?Correct
Incorrect
-
Question 43 of 55
43. Question
1 pointsWhich statement describes the state of the administrator and guest accounts after a user installs Windows desktop version to a new computer?Correct
Incorrect
-
Question 44 of 55
44. Question
1 pointsWhich two characteristics describe a virus? (Choose two.)Correct
Incorrect
-
Question 45 of 55
45. Question
1 pointsA technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What can the technician do to resolve this problem?Correct
Incorrect
-
Question 46 of 55
46. Question
1 pointsA security incident has been filed and an employee believes that someone has been on the computer since the employee left last night. The employee states that the computer was turned off before the employee left for the evening. The computer is running slowly and applications are acting strangely. Which Microsoft Windows tool would be used by the security analyst to determine if and when someone logged on to the computer after working hours?Correct
Incorrect
-
Question 47 of 55
47. Question
1 pointsWhich type of events should be assigned to categories in Sguil?Correct
Incorrect
-
Question 48 of 55
48. Question
1 pointsWhat information does an Ethernet switch examine and use to forward a frame?Correct
Incorrect
-
Question 49 of 55
49. Question
1 pointsIn threat intelligence communications, which sharing standard is a specification for an application layer protocol that allows communication of cyberthreat intelligence over HTTPS?Correct
Incorrect
-
Question 50 of 55
50. Question
1 pointsRefer to the exhibit. A network security analyst is examining captured data using Wireshark. What is represented by the first three frames?Correct
Incorrect
-
Question 51 of 55
51. Question
1 pointsThe IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?Correct
Incorrect
-
Question 52 of 55
52. Question
1 pointsHow many host addresses are available on the 192.168.10.128/26 network?Correct
Incorrect
-
Question 53 of 55
53. Question
1 pointsWhat are two types of attacks used on DNS open resolvers? (Choose two.)Correct
Incorrect
-
Question 54 of 55
54. Question
1 pointsWhat are three access control security services? (Choose three.)Correct
Incorrect
-
Question 55 of 55
55. Question
1 pointsWhen dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to block a potential back door creation? (Choose two.)Correct
Incorrect