Home
Home
CYBEROPS ASSOCIATELEVEL 2
CCNA SECURITY V2.0LEVEL 3
CCNAS V2 INSTRUCTOR LAB
Home
CyberOps Associate 1.0
CyberOps Associate (Version 1.0) – Modules 26 – 28: Analyzing Security Data Group Exam
0
Share
normalization
aggregation
compliance
log collection
4. A threat actor has successfully breached the network firewall without being detected
by the IDS system. What condition describes the lack of alert?
false negative
true negative
true positive
false positive
Explanation: A false negative is where no alert exists and exploits are not being
detected by the security systems that are in place.
5. What information is contained in the options section of a Snort rule?
human resources
legal department
management
IT support
Explanation: The management team creates the policies, designs the budget, and is in
charge of staffing all departments. Management is also responsible for coordinating the
incident response with other stakeholders and minimizing the damage of an incident.
10. According to NIST, which step in the digital forensics process involves drawing
conclusions from data?
reporting
collection
examination
analysis
11. A cybersecurity analyst has been called to a crime scene that contains several
technology items including a computer. Which technique will be used so that the
information found on the computer can be used in court?
Tor
rootkit
unaltered disk image
log collection
Explanation: A normal file copy does not recover all data on a storage device so an
unaltered disk image is commonly made. An unaltered disk image preserves the original
evidence, thus preventing inadvertent alteration during the discovery phase. It also
allows recreation of the original evidence.
12. In which phase of the NIST incident response life cycle is evidence gathered that
can assist subsequent investigations by authorities?
postincident activities
detection and analysis
preparation
containment, eradication, and recovery
Explanation: NIST defines four phases in the incident response process life cycle. It is
in the containment, eradication, and recovery phase that evidence is gathered to resolve
an incident and to help with subsequent investigations.
13. When dealing with security threats and using the Cyber Kill Chain model, which
two approaches can an organization use to block a potential back door creation?
(Choose two.)
Explanation: In the installation phase of the Cyber Kill Chain, the threat actor
establishes a back door into the system to allow for continued access to the target.
Among other measures, using HIPS to alert or block on common installation paths and
auditing endpoints to discover abnormal file creations can help block a potential back
door creation.
14. What is defined in the SOP of a computer security incident response capability
(CSIRC)?
Explanation: A CSIRC will include standard operating procedures (SOPs) that are
followed during an incident response. Procedures include following technical processes,
filling out forms, and following checklists.
15. How does an application program interact with the operating system?
sending files
accessing BIOS or UEFI
making API calls
using processes
Curator
Beats
Squert
OSSEC
Sguil
Kibana
Squert
OSSEC
OSSEC
POSIX
Squert
Sguil
20. Which tool is a Security Onion integrated host-based intrusion detection system?
Snort
OSSEC
ELK
Sguil
classification
systemization
normalization
standardization
Explanation: For processing log entries, data normalization can organize and convert
data values in datasets from difference sources into common format. The normalization
makes it easy for further data analysis and reporting.
22. What is the purpose for data normalization?
SOC Manager
Tier 3 personnel
Tier 2 personnel
Tier 1 personnel
24. Refer to the exhibit. A security analyst is reviewing an alert message generated by
Snort. What does the number 2100498 in the message indicate?
Explanation: The sid field in a Snort alert message indicates the Snort security rule that
is triggered.
25. What are security event logs commonly based on when sourced by traditional
firewalls?
static filtering
application analysis
signatures
5-tuples
Explanation: Traditional firewalls commonly provide security event logs based on the
5-tuples of source IP address and port number, destination IP address and port number,
and the protocol in use.
26. What is the purpose for data reduction as it relates to NSM?
Explanation: The amount of network traffic that is collected by packet captures and the
number of log file entries and alerts that are generated by network and security devices
can be enormous. For this reason, it is important to identify the NSM-related data that
should be gathered. This process is called data reduction.
27. Why would threat actors prefer to use a zero-day attack in the Cyber Kill Chain
weaponization phase?
Explanation: When a threat actor prepares a weapon for an attack, the threat actor
chooses an automated tool (weaponizer) that can be deployed through discovered
vulnerabilities. Malware that will carry desired attacks is then built into the tool as the
payload. The weapon (tool plus malware payload) will be delivered to the target
system. By using a zero-day weaponizer, the threat actor hopes that the weapon will not
be detected because it is unknown to security professionals and detection methods are
not yet developed.
28. What is the objective the threat actor in establishing a two-way communication
channel between the target system and a CnC infrastructure?
to allow the threat actor to issue commands to the software that is installed on the
target
to send user data stored on the target to the threat actor
to steal network bandwidth from the network where the target is located
to launch a buffer overflow attack
Explanation: In the command and control phase of the Cyber Kill Chain, the threat
actor establishes command and control (CnC) with the target system. With the two-way
communication channel, the threat actor is able to issue commands to the malware
software installed on the target.
29. Which meta-feature element in the Diamond Model describes information gained by
the adversary?
methodology
resources
results
direction
Explanation: The meta-feature element results are used to delineate what the adversary
gained from the intrusion event.
30. In which step of the NIST incident response process does the CSIRT perform an
analysis to determine which networks, systems, or applications are affected; who or
what originated the incident; and how the incident is occurring?
incident notification
attacker identification
scoping
detection
Explanation: In the detection and analysis phase of the NIST incident response process
life cycle, the CSIRT should immediately perform an initial analysis to determine the
scope of the incident, such as which networks, systems, or applications are affected;
who or what originated the incident; and how the incident is occurring.
31. What is indicated by a Snort signature ID that is below 3464?
The SID was created by Sourcefire and distributed under a GPL agreement.
This is a custom signature developed by the organization to address locally
observed rules.
The SID was created by the Snort community and is maintained in Community
Rules.
The SID was created by members of EmergingThreats.
A retrospective analysis can help in tracking the behavior of the malware from
the identification point forward.
It can identify how the malware originally entered the network.
It can calculate the probability of a future incident.
It can determine which network host was first affected.
false negative
true positive
false positive
true negative
34. A network administrator is trying to download a valid file from an internal server.
However, the process triggers an alert on a NMS tool. What condition describes this
alert?
false negative
false positive
true negative
true positive
action on objectives
exploitation
reconnaissance
weaponization
Explanation: According to the Cyber Kill Chain model, in the reconnaissance phase the
threat actor performs research, gathers intelligence, and selects targets.
36. Which HIDS is integrated into the Security Onion and uses rules to detect changes
in host-based operating parameters caused by malware through system calls?
OSSEC
Bro
Snort
Suricata
Explanation: OSSEC is a HIDS integrated into the Security Onion and uses rules to
detect changes in host-based parameters like the execution of software processes,
changes in user privileges, registry modifications, among many others. OSSEC rules
will trigger events that occurred on the host, including indicators that malware may
have interacted with the OS kernel. Bro, Snort, and Suricata are examples of NIDS
systems.
37. Which type of events should be assigned to categories in Sguil?
false positive
true positive
false negative
true negative
Bro
Sguil
CapME
ELK
ST
AlertID
Pr
CNT
Explanation: The Sguil application window has several fields available that give
information about an event. The ST field gives the status of an event that includes a
color-coded priority from light yellow to red to indicate four levels of priority.
40. Match the Snort rule source to the description.
0
ShareFacebookTwitterGoogle+ReddIt
PREV POST
CyberOps Associate (Version 1.0) – Modules 24 – 25: Protocols and Log Files Group Exam
NEXT POST
(Answers) 1.1.1.4 Lab – Installing the CyberOps Workstation Virtual Machine (Instructor
Version)
You Might Also LikeMore From Author
CYBEROPS ASSOCIATE 1.0
Subscribe
Login
{}[+]
0 COMMENTS
HOME
CYBEROPS ASSOCIATELEVEL 2
1