Cisco CyberOps Associate Study Questions Flashcards
What does it mean when access to a resource is granted with discretionary control?
A. Access can be configured only by an administrator.
B. Access can be granted only by the owner of the resource.
C. Access is granted to all users.
D. Access is read-only for everyone.
In the field of information security, the CIA of data is a crucial point of concern. What does CIA refer to?
A. The data’s Confidentiality, Integrity, and Availability.
B. The data’s Confidentiality, Identity, and Availability.
C. The data’s Confidentiality, Integrity, and Authorization.
D. The data’s Confidentiality, Identity, and Authorization.
Which of the following refers to disassembling an object to understand how it works and study its structure and behavior?
A. Threat actor
B. Threat hunting
C. Reverse engineering
D. Malware analysis
Which of the following represents the use of a vulnerability to breach a system?
A. Exploit
B. Threat
C. Zero trust
D. Vulnerability
Which cryptographic key is used by an X.509 certificate?
A. Asymmetric
B. Public
C. Private
D. Asymmetric
Which of the following describes the advantages of application visibility and control?
A. Applications and traffic in the network are controlled to protect assets against attacks and manage bandwidth.
B. All documents are encrypted with a private key.
C. Establishes a platform to test environments for unknown threats.
D. Provides a database that stores low-level settings for the operating system.
Which of the following is a code injection technique that launches malicious statements via input fields?
A. DDoS
B. SQLi
C. Brute-force
D. SSRF
Which type of attack can a traditional firewall protect a system against?
A. Dumpster diving
B. Denial-of-Service (DoS)
C. Phishing
D. Shoulder surfing
Which of the following definitions of the Windows registry is correct?
A. A set of pages that currently reside in physical memory.
B. A basic unit to which the operating system allocates processor time.
C. A set of virtual memory addresses.
D. A database that stores low-level settings for the operating system.
Which of the following best describes the IIS Log Parser tool?
A. A dynamic tool that allows execution of SQL-like queries for log files.
B. A tool used to control data sources, such as databases.
C. A tool that monitors the availability of log files.
D. A tool used for remote database connection
Which of the following terms applies to evidence that supports existing theories derived from an original piece of evidence?
A. Corroborative
B. Probabilistic
C. Accurate
D. Indirect
Which directory is commonly used in Linux systems to store log files, including syslog and Apache access logs?
A. /etc/log
B. /root/log
C. /lib/log
D. /var/log
Which of the following terms refers to a case in which an IDS fails to identify an actual attack?
A. True positive
B. False negative
C. True negative
D. False positive
Which of the following refers to improving data integrity by removing IPS events?
A. Digital signing
B. Operational cleaning
C. Data normalization
D. Integrity validation
John sent an HTTP GET request to get a file from the web server. Which event artifact will identify the request?
A. URI
B. HTTPS
C. Destination MAC address
D. Source IP address
Which of the following is the maximum size of an IPv4 header?
A. 32 bytes
B. 60 bytes
C. 64 bytes
D. 20 bytes
Which of the following relate to the preparation phase? (choose more than one)
A. Smartphones available for emergency communication
B. Communication and coordination mechanisms that serve as backups in case of a failure.
C. Secure storage facilities
D. None of the above
What is adjusting security according to threats from a hacktivist group known as in NIST SP800- 61 r2?
A. Adjustment
B. Preparation
C. Precursor
D. Instigator
When an instruction is issued stating that more than one person must perform a critical task, which principle is being followed?
A. There is no such particular principle
B. Separation of duties
C. Due diligence
D. Free action
Which property of information security does encryption support?
A. Integrity
B. Availability
C. Confidentiality
D. Sustainability
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
A. Confidentiality, integrity, and availability
B. Confidentiality, identity, and availability
C. Confidentiality, integrity, and authorization
D. Confidentiality, identity, and authorization
According to RFC 1035, which transport protocol is recommended for use with DNS queries?
A. Transmission Control Protocol
B. Reliable Data Protocol
C. Hypertext Transfer Protocol
D. User Datagram Protocol
Which term represents the chronological record of how evidence was collected, analyzed, preserved, and transferred?
A. Chain of evidence
B. Evidence chronology
C. Chain of custody
D. Record of safekeeping
In computer security, what information does PHI describe?
A. Private host information
B. Protected health information
C. Personal health information
D. Protected host information