Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cisco Certified CyberOps Associate 200-201 Certification Guide

You're reading from   Cisco Certified CyberOps Associate 200-201 Certification Guide Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents

Arrow left icon
Product type Paperback
Published in Jun 2021
Publisher Packt
ISBN-13 9781800560871
Length 660 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Glen D. Singh Glen D. Singh
Author Profile Icon Glen D. Singh
Glen D. Singh
Arrow right icon
View More author details
Toc

Table of Contents (25) Chapters Close

Preface 1. Section 1: Network and Security Concepts
2. Chapter 1: Exploring Networking Concepts FREE CHAPTER 3. Chapter 2: Exploring Network Components and Security Systems 4. Chapter 3: Discovering Security Concepts 5. Section 2: Principles of Security Monitoring
6. Chapter 4: Understanding Security Principles 7. Chapter 5: Identifying Attack Methods 8. Chapter 6: Working with Cryptography and PKI 9. Section 3: Host and Network-Based Analysis
10. Chapter 7: Delving into Endpoint Threat Analysis 11. Chapter 8: Interpreting Endpoint Security 12. Chapter 9: Exploring Computer Forensics 13. Chapter 10: Performing Intrusion Analysis 14. Section 4: Security Policies and Procedures
15. Chapter 11: Security Management Techniques 16. Chapter 12: Dealing with Incident Response 17. Chapter 13: Implementing Incident Handling 18. Chapter 14: Implementing Cisco Security Solutions 19. Chapter 15: Working with Cisco Security Solutions 20. Chapter 16: Real-World Implementation and Best Practices 21. Chapter 17: Mock Exam 1
22. Chapter 18: Mock Exam 2
23. Assessment 24. Other Books You May Enjoy

Chapter 17: Mock Exam 1

  1. A rogue device has been detected on a network. Which of the following can be used to help determine the type or vendor of the device?

    A. IP address

    B. Service port number

    C. MAC address

    D. All of the above

  2. A security professional suspects that the ARP cache of a host system was compromised. Which of the following commands can be used to show the ARP entries?

    A. arp -a

    B. ipconfig

    C. ifconfig

    D. netstat -ano

  3. An attacker was able to perform a man-in-the-middle attack and retrieved a victim's user credentials. Which of the following protocols was the victim most likely using?

    A. S/MIME

    B. HTTPS

    C. SMTP

    D. FTPS

  4. An attacker was able to redirect users to a malware-infected web server whenever they visited the URL http://www.server.local. Which of the following protocols was compromised?

    A. ICMP

    B. IP

    C. ARP

    D. DNS

  5. Which of the following is not a threat identification method that's used by an Intrusion Prevention System (IPS)?

    A. Algorithm-based

    B. Global Threat Correlation

    C. Protocol analysis

    D. Signature-based

  6. A security professional wants to protect the user's inbound and outbound web traffic. Which of the following should be used?

    A. Next-generation firewall

    B. Web security appliance

    C. Intrusion prevention system

    D. Access control list

  7. Which of the following is the most vulnerable state of data?

    A. Data in use

    B. Data at rest

    C. Data in motion

    D. None of the above

  8. Which of the following can be used to verify the integrity of data?

    A. Encrypting the file

    B. Copying the file

    C. Hashing

    D. All of the above

  9. Which of the following attacks affects availability?

    A. IP spoofing

    B. MiTM

    C. ARP poisoning

    D. DDoS

  10. Which of the following best describes a security engineer proactively searching the corporate network for any malware that has not been detected by their security appliances?

    A. Threat hunting

    B. Vulnerability scanning

    C. Penetration testing

    D. All of the above

  11. A person who uses their hacking skills to perform acts in support of a social or political movement is called a what?

    A. Hacktivist

    B. Script kiddie

    C. White hat

    D. State sponsored

  12. Which of the following techniques is used to further understand the functionality of a piece of malware?

    A. Threat hunting

    B. Malware scanning

    C. Reverse engineering

    D. All of the above

  13. Which of the following strategies best describes that an organization is aware of the risks involved in their actions and operations, but does not do anything about it?

    A. Risk avoidance

    B. Risk acceptance

    C. Risk transference

    D. Risk limitation

  14. Which type of SOC focuses on ensuring the organization meets all the regulatory standards and requirements that are governed by the law?

    A. Internal SOC

    B. Operational SOC

    C. Threat hunting SOC

    D. Compliance-based SOC

  15. Which of the following is not used to identify a unidirectional flow of traffic on a network?

    A. Protocol

    B. Source IP address

    C. Source MAC address

    D. Destination service port number

  16. An attacker wants to confuse the security analysts by altering the timestamps on the alerts logs. Which of the following protocols can the attacker attempt to compromise?

    A. DHCP

    B. SMTP

    C. DNS

    D. NTP

  17. Which of the following security controls can stop a MiTM attack?

    A. Dynamic ARP inspection

    B. DHCP snooping

    C. Encryption

    D. All of above

  18. An attacker can inject code and modify the records of a database. Which of the following attacks is being carried out?

    A. Protocol injection

    B. SQL injection

    C. HTTP injection

    D. Cross-site scripting

  19. Which one of the following attacks allows a hacker to execute commands on a server?

    A. Protocol-based attack

    B. Cross-site request forgery

    C. Cross-site scripting

    D. Command injection

  20. A user wants to verify the identity of a web server. Which of the following can be used?

    A. Domain name

    B. Digital certificate

    C. IP address

    D. All of the above

  21. An attacker is attempting to trick a CEO of a large organization into clicking a malicious link within an email message. Which type of attack is this?

    A. Farming

    B. Vishing

    C. Whaling

    D. Spear phishing

  22. Which of the following is not a technique used by a hacker to evade detection?

    A. Encryption

    B. Tunneling

    C. Shellcode

    D. Fragmentation

  23. Which of the following is a component of cryptography?

    A. Data encryption

    B. Origin authentication

    C. Non-repudiation

    D. All of the above

  24. Which of the following can be used as an additional layer of security for integrity checking data?

    A. HMAC

    B. Encryption

    C. Digital certificate

    D. All of the above

  25. Which of the following techniques uses the same key to encrypt and decrypt data?

    A. PKI

    B. Asymmetric

    C. Symmetric

    D. RSA

  26. Which type of cryptanalysis best describes how the attacker has access to the ciphertext and has knowledge of some information about the plaintext message?

    A. Meet-in-the-middle

    B. Chosen-ciphertext

    C. Chosen-plaintext

    D. Known-plaintext

  27. Which of the following encryption algorithms uses different keys to encrypt and decrypt?

    A. AES

    B. RSA

    C. DES

    D. 3DES

  28. Which of the following wireless security standards uses AES to handle data encryption?

    A. WPA2

    B. WPA

    C. WEP

    D. All of the above

  29. A user clicks on a link and a file is downloaded on their system and executed. After a few seconds, all their data is encrypted, and a payment screen is presented on their desktop. This is an indication of which of the following threats?

    A. Worm

    B. Ransomware

    C. Spyware

    D. Bot

  30. A security engineer wants to restrict employees to only opening certain applications on their computer. Which of the following techniques is recommended?

    A. All the computer's antivirus programs handle this restriction

    B. Using sandboxing techniques

    C. Using a host-based firewall

    D. Application whitelisting

  31. Which of the following best describes a child process without a parent process?

    A. Thread

    B. Service

    C. Orphan process

    D. Zombie process

  32. Which of the following registry hives is responsible for ensuring all the current applications are executed properly within Windows Explorer?

    A. HKEY_CURRENT_USER

    B. HKEY_LOCAL_MACHINE

    C. HKEY_CLASSES_ROOT

    D. HKEY_CURRENT_CONFIG

  33. Which filesystem has support for encryption, compression, file permissions, disk quotas, recovery, and improved performance and reliability?

    A. FAT

    B. NTFS

    C. FAT32

    D. exFAT

  34. Which of the following filesystems do not support journaling?

    A. EXT3

    B. EXT2

    C. EXT4

    D. None of the above

  35. According to CVSS, which of the following component metrics defines how an attack can happen on the target system?

    A. User interaction

    B. Attack complexity

    C. Attack vector

    D. Scope

  36. Which of the following types of malware allows a hacker to gain remote control of a victim's system?

    A. Spyware

    B. Worm

    C. Ransomware

    D. RAT

  37. Which of the following NIST standards defines how to integrate forensic techniques into incident response?

    A. NIST SP 800-85

    B. NIST SP 800-86

    C. NIST SP 800-30

    D. NIST SP 800-124

  38. How can a forensic professional keep track of the history of evidence during the entire investigation process?

    A. Apply proper labeling

    B. Create a hash of the evidence

    C. Send an email containing the respective details

    D. Chain of custody

  39. Which type of evidence is defined as evidence that supports a theory that is related to the investigation?

    A. Corroborative

    B. Indirect

    C. Best evidence

    D. None of the above

  40. Which of the following NIST standards defines the practices for handling computer security incidents?

    A. NIST SP 800-85

    B. NIST SP 800-61

    C. NIST SP 800-30

    D. NIST SP 800-124

  41. Which of the following should be considered when you're creating an incident response plan?

    A. Goals

    B. Metrics

    C. Roadmap

    D. All of the above

  42. Which of the following phases in incident response focuses on removing the threat from the system?

    A. Recovery

    B. Detection and analysis

    C. Eradication

    D. Containment

  43. Which CSIRT team is responsible for disclosing security vulnerability details and information to their nation's population?

    A. Coordination centers

    B. PSIRT

    C. CERT

    D. National CSIRT

  44. Which of the following regulatory standards helps protect PHI?

    A. PCI DSS

    B. SOX

    C. HIPAA

    D. All of the above

  45. Which of the following is not an element of incident description according to VERIS?

    A. Actions

    B. Assets

    C. Actors

    D. Adversary

  46. Which of the following stages of the Cyber Kill Chain describes an attacker launching an exploit on the victim's system?

    A. Weaponization

    B. Exploitation

    C. Installation

    D. Command and control

  47. Which of the following is not a component of the diamond model of intrusion?

    A. Attack

    B. Adversary

    C. Victim

    D. Capability

  48. Which of the following is an example of PII?

    A. Telephone number

    B. Email address

    C. Credit card number

    D. All of the above

  49. At which stage of the Cyber Kill Chain does the attacker exfiltrate data?

    A. Weaponization

    B. Actions on objectives

    C. Installation

    D. Command and control

  50. Which type of malware is self-replicating and self-propagating?

    A. Spyware

    B. Worm

    C. Trojan

    D. Bot

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image