CyberOps Associate 1.0 Practice Final Exam Answers
CyberOps Associate 1.0 Practice Final Exam Answers
IT Questions Bank IOS Command List CCNA » CCNA Security v2.0 » Cybersecurity »
Modules 1 - 2: Threat
Actors and Defenders
Group Exam Answers
Modules 3 - 4: Operating
System Overview Group
Exam Answers
AD
Modules 5 - 10: Network
Fundamentals Group Exam
Answers
Modules 21 - 23:
How to find: Press “Ctrl + F” in the browser and fill in Cryptography and Endpoint
whatever wording is in the question to find that Protection Group Exam
Answers
question/answer. If the question is not here, find it in
Questions Bank. Modules 24 - 25: Protocols
and Log Files Group Exam
Answers
NOTE: If you have the new question on this test, please
Modules 26 - 28: Analyzing
comment Question and Multiple-Choice list in form Security Data Group Exam
below this article. We will update answers for you in Answers
the shortest time. Thank you! We truly value your
[Skills Exams] CA Skills
contribution to the website.
Assessment
CyberOps Associate
AD
(Version 1.0) Practice
Final Exam Answers
CyberOps Associate
Course FINAL EXAM
ANSWERS
Related Posts
CyberOps Associate (Version 1.0) – CyberOps
Module 14: Common Threats and
Associate 1.0 Practice Final exam answers Attacks Quiz Answers
1. What are two problems that can be caused by a large 12.3.12 Check Your Understanding –
number of ARP request and reply messages? (Choose two.) Identify the Network Security Device
or Service Answers
All ARP request messages must be processed by all
CyberOps Associate: Module 24 –
nodes on the local network.
Technologies and Protocols
A large number of ARP request and reply messages may
slow down the switching process, leading the switch to CyberOps Associate: Module 11 –
Network Communication Devices
make many changes in its MAC table.
The network may become overloaded because ARP reply Module 8: Address Resolution
Protocol Quiz Answers
messages have a very large payload due to the 48-bit MAC
address and 32-bit IP address that they contain. 6.2.10 Check Your Understanding –
The ARP request is sent as a broadcast, and will flood IPv4 Packet Answers
the entire subnet. CCNA CyberOps Associate (Version
Switches become overloaded because they concentrate all 1.0) Exam Answers Full
the traffic from the attached subnets.
Modules 1 – 2: Threat Actors and
Defenders Group Exam (Answers)
Explanation: ARP requests are sent as broadcasts:
28.3.4 Check Your Understanding –
(1) All nodes will receive them, and they will be processed Identify the Diamond Model Features
by software, interrupting the CPU. Answers
(2) The switch forwards (floods) Layer 2 broadcasts to all
3.2.12 Check Your Understanding –
ports. Identify the Windows Registry Hive
A switch does not change its MAC table based on ARP Answers
request or reply messages. The switch populates the MAC
table using the source MAC address of all frames. The ARP Recent Comments
payload is very small and does not overload the switch.
sdf on SRWE (Version 7.00) Final PT
Skills Assessment Exam (PTSA)
2. Refer to the exhibit. Which field in the Sguil application Answers
window indicates the priority of an event or set of Kram on CCNA1 v7.0: ITN Practice
correlated events? PT Skills Assessment (PTSA)
Answers
ST
AlertID
Pr
CNT
AD
/25
/26
/27
/28
AD
NetFlow
Wireshark
SNMP
SIEM
SNMP
ICMP
Telnet
TCP
AD
11. What are two ICMPv6 messages that are not present in
ICMP for IPv4? (Choose two.)
Neighbor Solicitation
Destination Unreachable
Host Confirmation
Time Exceeded
Router Advertisement
Route Redirection
penetration used to determine the possible
testing consequences of successful attacks on
the network
SNMP
SPAN
Wireshark
SIEM
AD
full access
read, write
read
read, write, execute
origin authentication
data integrity
nonrepudiation
data confidentiality
TCP port 40
encryption for all communication
single process for authentication and authorization
UDP port 1645
encryption for only the password of a user
separate processes for authentication and
authorization
AD
19. In an attempt to prevent network attacks, cyber analysts
share unique identifiable attributes of known attacks with
colleagues. What three types of attributes or indicators of
compromise are helpful to share? (Choose three.)
anycast
broadcast
neighbor solicitation
echo reply
echo request
neighbor advertisement
AD
23. Match the description to the antimalware approach. (Not
all options are used.)
ICMP
IP
UDP
PPP
TCP
Explanation: TCP and UDP reside at the transport layer in
both the OSI and TCP/IP models.
confidentiality
remediation level
integrity
attack vector
exploit
availability
Explanation:
The Common Vulnerability Scoring System (CVSS) is a
vendor-neutral, industry standard, open framework for
weighing the risks of a vulnerability using a variety of
metrics. CVSS uses three groups of metrics to assess
vulnerability, the Base Metric Group, Temporal Metric
Group, and Environmental Metric Group. The Base Metric
Group has two classes of metrics (exploitability and
impact). The impact metrics are rooted in the following
areas: confidentiality, integrity, and availability.
AD
29. Match the steps with the actions that are involved when
an internal host with IP address 192.168.10.10 attempts to
send a packet to an external server at the IP address
209.165.200.254 across a router R1 that is running dynamic
NAT. (Not all options are used.)
Step The host sends packets that request a connection
1 to the server at the address 209.165.200.254.
31. What are two shared characteristics of the IDS and the
IPS? (Choose two.)
Explanation:
With a three interface firewall design that has internal,
external, and DMZ connections, typical configurations
include the following:
Traffic originating from DMZ destined for the internal
network is normally blocked.
Traffic originating from the DMZ destined for external
networks is typically permitted based on what services are
being used in the DMZ.
Traffic originating from the internal network destined from
the DMZ is normally inspected and allowed to return.
Traffic originating from external networks (the public
network) is typically allowed in the DMZ only for specific
services.
AD
35. Which two actions can be taken when configuring
Windows Firewall? (Choose two.)
40. What are two elements that form the PRI value in a
syslog message? (Choose two.)
facility
timestamp
severity
header
hostname
DNS tunneling
TCP SYN flood
DHCP spoofing
ARP cache poisoning
man-in-the-middle attack
DoS attack
ransomware
Trojan horse
city of residence
Facebook photos
name of a bank
name of a pet
street address
51. When dealing with a security threat and using the Cyber
Kill Chain model, which two approaches can an
organization use to help block potential exploitations on a
system? (Choose two.)
Explanation:
HTTPS adds extra overhead to the HTTP-formed packet.
HTTPS encrypts using secure socket layer (SSL). Even
though some devices can perform SSL decryption and
inspection, this can present processing and privacy issues.
HTTPS adds complexity to packet captures due to the
additional message involved in establishing an encrypted
data connection.
3DES
IKE
DSA
AES
ECDSA
RSA
statement of authority
identification and authentication policy
campus access policy
Internet access policy
statement of scope
acceptable use policy
PC-A
DNS server
web server
router DG
router ISP
network layer
transport layer
data link layer
application layer
to prevent loops
to isolate traffic
to filter traffic
to prevent collisions
postincident activities
detection and analysis
containment, eradication, and recovery
preparation
Explanation: It is in the detection and analysis phase of
the NIST incident response life cycle that the CSIRT
identifies and validates incidents through continuous
monitoring. The NIST defines four stages of the incident
response life cycle.
direct evidence
corroborating evidence
best evidence
indirect evidence
Subscribe
Join the discussion
{} [+]
7 COMMENTS
Reply
POP3
MIME
IMAP
SMTP
Reply
Reply to anon
Author
Added, thanks for sharing!
Reply
Reply to someone
Author
Thanks for sharing!
Reply
Reply
Reply to Anon
Author
Thanks for sharing!
Reply