Let’s travel together.

CCNA Cybersecurity Operations (Vesion 1.1) – CyberOps Chapter 1 Exam Answers

0
  1. What is cyberwarfare?
  • It is an attack only on military targets.
  • It is an attack on a major corporation.
  • It is an attack that only involves robots and bots.
  • It is an attack designed to disrupt, corrupt, or exploit national interests. *

  • Which statement describes cyberwarfare?
    • Cyberwarfare is an attack carried out by a group of script kiddies.
    • It is a series of personal protective equipment developed for soldiers involved in nuclear war.
    • It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
    • It is Internet-based conflict that involves the penetration of information systems of other nations.
  • in the operation of a SOC, which system is frequently used to let an analyst select alerts from a pool to investigate?
    • syslog server
    • registration system
    • ticketing system
    • security alert knowledge-based system
  • How can a security information and event management system in an SOC be used to help personnel fight against security threats?
    • By collecting and filtering data *
    • By filtering network traffic
    • By authenticating users to network resources
    • By encrypting communications to remote sites
  • Which statement best describes a motivation of hacktivists?
    • They are part of a protest group behind a political cause.
    • They are curious and learning hacking skills.
    • They are trying to show off their hacking skills.
    • They are interested in discovering new exploits.
  • If a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be considered within its goal?
    • Approximately 5 minutes per year.
    • Approximately 10 minutes per year.
    • Approximately 20 minutes per year.
    • Approximately 30 minutes per year.
  • Why do IoT devices pose a greater risk than other computing devices on a network?
    • Most IoT devices do not require an Internet connection and are unable to receive new updates.
    • IoT devices cannot function on an isolated network with only an Internet connection.
    • Most IoT devices do not receive frequent firmware updates.
    • IoT devices require unencrypted wireless connections.
  • Which two services are provided by security operations centers? (Choose two.)
    • managing comprehensive threat solutions
    • ensuring secure routing packet exchanges
    • responding to data center physical break-ins
    • monitoring network security threats
    • providing secure Internet connections
  • What name is given to hackers who hack for a political or social cause?
    • White hat
    • Hacker
    • Hacktivist *
    • Blue hat
  • The term Alert Analyst refers to which group of personnel in an SOC?
    • Tier 1 personnel *
    • Tier 2 personnel
    • Tier 3 personnel
    • SOC managers
  • What is a rogue wireless hotspot?
    • It is a hotspot that was set up with outdated devices.
    • It is a hotspot that does not encrypt network user traffic.
    • It is a hotspot that does not implement strong user authentication mechanisms.
    • It is a hotspot that appears to be from a legitimate business but was actually set up by someone without the permission from the business. *
  • What is a potential risk when using a free and open wireless hotspot in a public location?
    • Too many users trying to connect to the Internet may cause a network traffic jam.
    • The Internet connection can become too slow when many users access the wireless hotspot.
    • Network traffic might be hijacked and information stolen.
    • Purchase of products from vendors might be required in exchange for the Internet access.
  • How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?
    • by integrating all security devices and appliances in an organization
    • by analyzing logging data in real time
    • by combining data from multiple technologies
    • by dynamically implementing firewall rules
  • Users report that a database file on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
    • man-in-the-middle attack
    • DoS attack
    • ransomware
    • Trojan horse
  • Which organization offers the vendor-neutral CySA+ certification?
    • IEEE
    • CompTIA
    • (ISC)²
    • GIAC
  • What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
    • DDoS
    • SQL injection
    • PSYOPS
    • Stuxnet
  • Which three technologies should be included in a SOC security information and event management system? (Choose three.)
    • firewall appliance
    • security monitoring
    • log management
    • intrusion prevention
    • proxy service
    • threat intelligence
  • Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?
    • SOC Manager
    • Tier 2 personnel
    • Tier 3 personnel
    • Tier 1 personnel
  • What name is given to an amateur hacker?
    • red hat
    • script kiddie
    • black hat
    • blue team
  • Which personnel in a SOC are assigned the task of hunting for potential threats and implementing threat detection tools?
    • Tier 1 Analyst
    • SOC Manager
    • Tier 2 Incident Reporter
    • Tier 3 SME
  • Match the components to the major categories in a SOC.
    Question:

    Answer:
  • 0 0 votes
    Article Rating
    Subscribe
    Notify of
    guest

    0 Comments
    Inline Feedbacks
    View all comments
    0
    Would love your thoughts, please comment.x
    ()
    x