Category: CCNA CyberOps

Quiz Chapter 11-13 CCNA CyberOps Version 1.1 Answers

1. Which statement describes an operational characteristic of NetFlow? NetFlow collects metadata about the packet flow, not the flow data itself. 2. What is the purpose of Tor? to allow users to browse the Internet anonymously 3. Threat actors may attack the    infrastructure in order to corrupt …

Quiz Chapter 9-10 CCNA CyberOps Version 1.1 Answers

1. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? a private key 2. Which IETF standard defines the PKI digital certificate format? X.509 3. Which statement describes the use of hashing? Hashing can be used to detect accidental changes, …

Quiz Chapter 7-8 CCNA CyberOps Version 1.1 Answers

1. Which monitoring technology mirrors traffic flowing through a switch to an analysis device connected to another switch port? NetFlow SNMP SIEM SPAN 2. Which network technology uses a passive splitting device that forwards all traffic, including Layer 1 errors, to an analysis device? NetFlow network tap SNMP …