Category: CCNA CyberOps
CCNA Cybersecurity Operations v1.1 Skills Assessment Introduction Working as the security analyst for ACME Inc., you notice a number of events on the SGUIL dashboard. Your task is to analyze these events, learn more about them, and decide if they indicate malicious activity. You will have access to …
1. Refer to the exhibit. Approximately what percentage of the physical memory is still available on this Windows system? 32% 53% 68% 90% 2. Which Windows tool can be used by a cybersecurity administrator to secure stand-alone computers that are not part of an active directory domain? Local …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What are the steps in the Cyber Kill Chain? How do you classify an intrusion event using the Diamond Model? How do you apply the VERIS schema to an incident? What are the …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the structure of alerts? How are alerts classified? How is data prepared for use in a network security monitoring (NSM) system? How do you use Security Onion tools to investigate network …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the behavior of common network protocols in the context of security monitoring? How do security technologies affect the ability to monitor common network protocols? What are the types of data used …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What are some methods of mitigating malware? What are the contents of host-based IPS/IDS log entries? How do you use a public service to generate a malware analysis report? How do you classify …
Objectives Upon completion of this chapter, you will be able to answer the following questions: How is cryptography used to secure communications? What is the role of cryptography in ensuring the integrity and authenticity of data? How do cryptographic approaches enhance data confidentiality? What is public key cryptography? …
Objectives Upon completion of this chapter, you will be able to answer the following questions: How is the defense-in-depth strategy used to protect networks? What are common security policies, regulations, and standards? What are access control policies? How is AAA used to control network access? What information sources …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the importance of network monitoring? How is network monitoring conducted? How do IP vulnerabilities enable network attacks? How do TCP and UDP vulnerabilities enable network attacks? What are the IP vulnerabilities? …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the evolution of network security? What are the various types of attack tools used by threat actors? What is malware? What are some common network attacks? Key Terms This chapter uses …