Last Updated on October 29, 2019 by Admin
CCNA CyberOps Chapter 1 Exam Online
CCNA CyberOps 1.1 -- Chapter 1 Exam
Quiz-summary
0 of 16 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
Information
CCNA CyberOps 1.1 — Chapter 1 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 16 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- Answered
- Review
-
Question 1 of 16
1. Question
1 pointsWhat was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
Correct
Incorrect
The Stuxnet malware program is an excellent example of a sophisticated cyberwarfare weapon. In 2010, it was used to attack programmable logic controllers that operated uranium enrichment centrifuges in Iran.
Hint
The Stuxnet malware program is an excellent example of a sophisticated cyberwarfare weapon. In 2010, it was used to attack programmable logic controllers that operated uranium enrichment centrifuges in Iran.
-
Question 2 of 16
2. Question
1 pointsWhat is a potential risk when using a free and open wireless hotspot in a public location?
Correct
Incorrect
Many free and open wireless hotspots operate with no authentication or weak authentication mechanisms. Attackers could easily capture the network traffic in and out of such a hotspot and steal user information. In addition, attackers might set up a “rogue” wireless hotspot to attract unsuspecting users to it and then collect information from those users.
Hint
Many free and open wireless hotspots operate with no authentication or weak authentication mechanisms. Attackers could easily capture the network traffic in and out of such a hotspot and steal user information. In addition, attackers might set up a “rogue” wireless hotspot to attract unsuspecting users to it and then collect information from those users.
-
Question 3 of 16
3. Question
2 pointsWhich two services are provided by security operations centers? (Choose two.)
Correct
Incorrect
Security operations centers (SOCs) can provide a broad range of services to defend against threats to information systems of an organization. These services include monitoring threats to network security and managing comprehensive solutions to fight against threats. Ensuring secure routing exchanges and providing secure Internet connections are tasks typically performed by a network operations center (NOC). Responding to facility break-ins is typically the function and responsibility of the local police department.
Hint
Security operations centers (SOCs) can provide a broad range of services to defend against threats to information systems of an organization. These services include monitoring threats to network security and managing comprehensive solutions to fight against threats. Ensuring secure routing exchanges and providing secure Internet connections are tasks typically performed by a network operations center (NOC). Responding to facility break-ins is typically the function and responsibility of the local police department.
-
Question 4 of 16
4. Question
1 pointsWhich statement describes cyberwarfare?
Correct
Incorrect
Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. Organized hackers are typically involved in such an attack.
Hint
Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. Organized hackers are typically involved in such an attack.
-
Question 5 of 16
5. Question
1 pointsWhich personnel in a SOC are assigned the task of hunting for potential threats and implementing threat detection tools?
Correct
Incorrect
In a SOC, Tier 3 SMEs have expert-level skills in network, endpoint, threat intelligence, and malware reverse engineering (RE). They are deeply involved in hunting for potential security threats and implementing threat detection tools.
Hint
In a SOC, Tier 3 SMEs have expert-level skills in network, endpoint, threat intelligence, and malware reverse engineering (RE). They are deeply involved in hunting for potential security threats and implementing threat detection tools.
-
Question 6 of 16
6. Question
1 pointsIn the operation of a SOC, which system is frequently used to let an analyst select alerts from a pool to investigate?
Correct
Incorrect
In a SOC, a ticketing system is typically used for a work flow management system.
Hint
In a SOC, a ticketing system is typically used for a work flow management system.
-
Question 7 of 16
7. Question
1 pointsWhy do IoT devices pose a greater risk than other computing devices on a network?
Correct
Incorrect
IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.
Hint
IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.
-
Question 8 of 16
8. Question
1 pointsWhich personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?
Correct
Incorrect
In a SOC, the job of a Tier 1 Alert Analyst includes monitoring incoming alerts and verifying that a true security incident has occurred.
Hint
In a SOC, the job of a Tier 1 Alert Analyst includes monitoring incoming alerts and verifying that a true security incident has occurred.
-
Question 9 of 16
9. Question
3 pointsWhich three technologies should be included in a SOC security information and event management system? (Choose three.)
Correct
Incorrect
Technologies in a SOC should include the following:
Event collection, correlation, and analysis
Security monitoring
Security control
Log management
Vulnerability assessment
Vulnerability tracking
Threat intelligence
Proxy server, VPN, and IPS are security devices deployed in the network infrastructure.Hint
Technologies in a SOC should include the following:
Event collection, correlation, and analysis
Security monitoring
Security control
Log management
Vulnerability assessment
Vulnerability tracking
Threat intelligence
Proxy server, VPN, and IPS are security devices deployed in the network infrastructure. -
Question 10 of 16
10. Question
1 pointsIf a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be considered within its goal?
Correct
Incorrect
Within a year, there are 365 days x 24 hours a day x 60 minutes per hour = 525,600 minutes. With the goal of uptime 99.999% of time, the downtime needs to be controlled under 525,600 x (1-0.99999) = 5.256 minutes a year.
Hint
Within a year, there are 365 days x 24 hours a day x 60 minutes per hour = 525,600 minutes. With the goal of uptime 99.999% of time, the downtime needs to be controlled under 525,600 x (1-0.99999) = 5.256 minutes a year.
-
Question 11 of 16
11. Question
1 pointsWhich statement best describes a motivation of hacktivists?
Correct
Incorrect
Each type of cybercriminal has a distinct motivation for his or her actions.
Hint
Each type of cybercriminal has a distinct motivation for his or her actions.
-
Question 12 of 16
12. Question
1 pointsHow does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?
Correct
Incorrect
A security information and event management system (SIEM) combines data from multiple sources to help SOC personnel collect and filter data, detect and classify threats, analyze and investigate threats, and manage resources to implement preventive measures.
Hint
A security information and event management system (SIEM) combines data from multiple sources to help SOC personnel collect and filter data, detect and classify threats, analyze and investigate threats, and manage resources to implement preventive measures.
-
Question 13 of 16
13. Question
1 pointsWhat name is given to an amateur hacker?
Correct
Incorrect
Script kiddies is a term used to describe inexperienced hackers.
Hint
Script kiddies is a term used to describe inexperienced hackers.
-
Question 14 of 16
14. Question
1 pointsWhich organization offers the vendor-neutral CySA+ certification?
Correct
Incorrect
The CompTIA Cybersecurity Analyst (CySA+) certification is a vendor-neutral security professional certification.
Hint
The CompTIA Cybersecurity Analyst (CySA+) certification is a vendor-neutral security professional certification.
-
Question 15 of 16
15. Question
1 pointsUsers report that a database file on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
Correct
Incorrect
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.
Hint
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.
-
Question 16 of 16
16. Question
6 pointsMatch the components to the major categories in a SOC.
Sort elements
- alert
- monitor
- investigate
- log
- sensor
- database
-
SOC Processes - Target
-
SOC Processes - Target
-
SOC Processes - Target
-
SOC Technologies - Target
-
SOC Technologies - Target
-
SOC Technologies - Target
Correct
Incorrect