Cisco CyberOps Associate Study Questions Flashcards
What does it mean when access to a resource is granted with discretionary control?
A. Access can be configured only by an administrator.
B. Access can be granted only by the owner of the resource.
C. Access is granted to all users.
D. Access is read-only for everyone.
In the field of information security, the CIA of data is a crucial point of concern. What does CIA refer to?
A. The data’s Confidentiality, Integrity, and Availability.
B. The data’s Confidentiality, Identity, and Availability.
C. The data’s Confidentiality, Integrity, and Authorization.
D. The data’s Confidentiality, Identity, and Authorization.
Which of the following refers to disassembling an object to understand how it works and study its structure and behavior?
A. Threat actor
B. Threat hunting
C. Reverse engineering
D. Malware analysis
Which of the following represents the use of a vulnerability to breach a system?
A. Exploit
B. Threat
C. Zero trust
D. Vulnerability
Which cryptographic key is used by an X.509 certificate?
A. Asymmetric
B. Public
C. Private
D. Asymmetric
Which of the following describes the advantages of application visibility and control?
A. Applications and traffic in the network are controlled to protect assets against attacks and manage bandwidth.
B. All documents are encrypted with a private key.
C. Establishes a platform to test environments for unknown threats.
D. Provides a database that stores low-level settings for the operating system.
Which of the following is a code injection technique that launches malicious statements via input fields?
A. DDoS
B. SQLi
C. Brute-force
D. SSRF
Which type of attack can a traditional firewall protect a system against?
A. Dumpster diving
B. Denial-of-Service (DoS)
C. Phishing
D. Shoulder surfing
Which of the following definitions of the Windows registry is correct?
A. A set of pages that currently reside in physical memory.
B. A basic unit to which the operating system allocates processor time.
C. A set of virtual memory addresses.
D. A database that stores low-level settings for the operating system.
Which of the following best describes the IIS Log Parser tool?
A. A dynamic tool that allows execution of SQL-like queries for log files.
B. A tool used to control data sources, such as databases.
C. A tool that monitors the availability of log files.
D. A tool used for remote database connection
Which of the following terms applies to evidence that supports existing theories derived from an original piece of evidence?
A. Corroborative
B. Probabilistic
C. Accurate
D. Indirect
Which directory is commonly used in Linux systems to store log files, including syslog and Apache access logs?
A. /etc/log
B. /root/log
C. /lib/log
D. /var/log
Which of the following terms refers to a case in which an IDS fails to identify an actual attack?
A. True positive
B. False negative
C. True negative
D. False positive
Which of the following refers to improving data integrity by removing IPS events?
A. Digital signing
B. Operational cleaning
C. Data normalization
D. Integrity validation
John sent an HTTP GET request to get a file from the web server. Which event artifact will identify the request?
A. URI
B. HTTPS
C. Destination MAC address
D. Source IP address
Which of the following is the maximum size of an IPv4 header?
A. 32 bytes
B. 60 bytes
C. 64 bytes
D. 20 bytes
Which of the following relate to the preparation phase? (choose more than one)
A. Smartphones available for emergency communication
B. Communication and coordination mechanisms that serve as backups in case of a failure.
C. Secure storage facilities
D. None of the above
What is adjusting security according to threats from a hacktivist group known as in NIST SP800- 61 r2?
A. Adjustment
B. Preparation
C. Precursor
D. Instigator
When an instruction is issued stating that more than one person must perform a critical task, which principle is being followed?
A. There is no such particular principle
B. Separation of duties
C. Due diligence
D. Free action
Which property of information security does encryption support?
A. Integrity
B. Availability
C. Confidentiality
D. Sustainability
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
A. Confidentiality, integrity, and availability
B. Confidentiality, identity, and availability
C. Confidentiality, integrity, and authorization
D. Confidentiality, identity, and authorization
According to RFC 1035, which transport protocol is recommended for use with DNS queries?
A. Transmission Control Protocol
B. Reliable Data Protocol
C. Hypertext Transfer Protocol
D. User Datagram Protocol
Which term represents the chronological record of how evidence was collected, analyzed, preserved, and transferred?
A. Chain of evidence
B. Evidence chronology
C. Chain of custody
D. Record of safekeeping
In computer security, what information does PHI describe?
A. Private host information
B. Protected health information
C. Personal health information
D. Protected host information
Which protocol maps IP network addresses to MAC hardware addresses so that IP packets can be sent across networks?
A. Internet Control Message Protocol
B. Address Resolution Protocol
C. Session Initiation Protocol
D. Transmission Control Protocol/Internet Protocol
Which term represents a weakness in a system that could lead to a system comprise?
A. Vulnerability
B. Threat
C. Exploit
D. Risk
Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two)
A. Confirm the timing of network connections differentiated by the TCP 5-tuple.
B. Audit applications used on a social networking website.
C. Determine user IDs involved in an instant message exchange.
D. Map internal private IP addresses to dynamically translated external public IP addresses.
E. Identify a malware variant carried over an SMTP connection
Based on which statement does the discretionary access control security model grant or restrict access?
A. Discretion of the system administrator
B. Security policy defined by the owner of an object
C. Security policy defined by the system administrator
D. Role of a user within an organization
Which security monitoring data type is associated with application server logs?
A. Alert data
B. Statistical data
C. Session data
D. Transaction data
Which activity may be an example of social engineering?
A. Receiving a call from the IT department asking you to verify your username/password to maintain your account.
B. Receiving an invitation to your department’s weekly WebEx meeting.
C. Sending a verbal request to an administrator to change the password of an account the administrator recognizes.
D. Receiving an email from MR requesting that you visit the secure HR website and update your contract information
Which of the following describes the Zero Trust model?
A. A unique trust model that establishes an encrypted connection between devices in a private network.
B. A model designed to protect systems by requiring authentication for any device or person trying to access the network.
C. A model that creates a blacklist that includes all devices that are not allowed to access resources.
D. None of the above
Which of the following is not related to SIEM system activity?
A. Monitoring
B. Service privileges
C. Incident response and log auditing
D. Total traffic encryption
In security terms, which of the following describes the principle of least privilege (POLP)?
A. Maintains regular network traffic to avoid overloads
B. Enterprise data management system
C. Restricts user permissions to the minimum required for their work.
D. Keeps computing systems up-to-date to improve protection
Which of the following is the correct definition of threat actors in cybersecurity?
A. A person or group of people trying to perform malicious acts against organizations, whether unintentionally or intentionally
B. A very strong hacking tool that helps commit malicious acts against organizations
C. Any malicious activity that occurs on mobile devices
D. Offensive security professionals who are experts in attacking systems and breaking through defenses.
Which of the following describes the run book automation (RBA)?
A. A system designed to enrich the IT department’s knowledge of innovations in the field
B. External hardware designed to protect enterprise computing systems by alerting the IT department about changes.
C. Maps internal private IP addresses to dynamically translated external public IP addresses.
D. A technology used to automate IT operations management
Which of the following describes the Threat Intelligence Platform (TIP)?
A. A platform that provides testing environments for unknown threats.
B. Hardware that is installed on enterprise computers to provide updates about security threats
C. A platform that gathers raw data to produce useable information for automated security control systems
D. A unique trust platform that creates an encrypted connection between devices in a private network
Which of the following describes SOAR?
A. Helps improve enterprise networking processes by speeding up network traffic
B. Collects data on security threats from a variety of sources and responds to security incidents without human assistance.
C. Collects data about user activity in the organization and provides remote help for errors
D. A cybersecurity teamwork method for responding to events
Which of the following represents the use of a vulnerability in a system that can help hackers breach a system?
A. Exploit
B. Threat
C. Zero Trust
D. Vulnerability
Which of the following describes Defense in Depth (DiD)?
A. Certification valued by cybersecurity professionals
B. Software designed to help a cybersecurity department receive updates on the organization’s security systems
C. A platform that provides testing environments for unknown threats
D. A series of layered protection mechanisms used to protect important data and information
Which of the following represents an access control model that enable users to perform activities based on the permissions assigned to their roles?
A. Nondiscretionary access control
B. Role-based access control
C. Time-based access control
D. Rule-based access control
Which of the following describes a type of security access control that grants or restricts object access via policies determined by the object’s owner?
A. Rule-based access control
B. Nondiscretionary access control
C. Discretionary access control
D. Mandatory access control
For which of the following access control models is the main purpose preserving the confidentiality of data?
A. Mandatory access control
B. Role-based access control
C. Nondiscretionary access control
D. Time-based access control
Which of the following refers to disassembling an object to see how it works and study its structure and behavior?
A. Threat actor
B. Threat hunting
C. Reverse engineering
Stateful and traditional firewalls can analyze packets and judge them against a set of predetermined rules called access control lists (ACLs). Which of the following elements do they inspect within a packet?
A. Session headers
B. NetFlow flow information
C. Source and destination ports and IP addresses
D. Protocol information
Which of the following are Layer 2 network attacks? (choose 3)
A. ARP attack
B. Brute-force attack
C. Spoofing attack
D. DDoS attack
E. VLAN hopping
F. Botnet attack
Which definition of Windows Registry is correct?
A. A set of pages that currently reside in physical memory
B. A basic unit to which the operating system allocates processor time
C. A set of virtual memory addresses
D. A database that stores low-level settings for the operating system
While viewing packet capture data, you notice that an IP is sending and receiving traffic for multiple devices by modifying the IP header. Which of the following make this behavior possible?
A. TOR
B. NAT
C. Encapsulation
D. Tunneling
Which is the correct definition of an antivirus program?
A. Program used to detect and remove unwanted malicious software from the system
B. A program that provides real-time analysis of security alerts generated by network hardware and applications
C. A program that scans a running application for vulnerabilities
D. Rules that allow network traffic to pass in and out