Csoa Test
Csoa Test
Explanation: The type of end user interaction required to launch a virus is typically opening an
application, opening a web page, or powering on the computer. Once activated, a virus may infect
other files located on the computer or other computers on the same network.
Too much information is destined for a particular memory block, causing additional memory areas to
be affected.
An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
Explanation: A Trojan horse carries out malicious operations under the guise of a legitimate program.
Denial of service attacks send extreme quantities of data to a particular host or network device
interface. Password attacks use electronic dictionaries in an attempt to learn passwords. Buffer
overflow attacks exploit memory buffers by sending too much information to a host to render the
system inoperable.
buffer overflow
phishing
man-in-the-middle
Explanation: A threat actor sends fraudulent email which is disguised as being from a legitimate,
trusted source to trick the recipient into installing malware on their device, or to share personal or
financial information.
Explanation: VLANs are used on a network to separate user traffic based on factors such as function,
project team, or application, without regard for the physical location of the user or device.
5. Refer to the exhibit. A cybersecurity analyst is viewing packets forwarded by switch S2. What
addresses will identify frames containing data sent from PCA to PCB?
Explanation: When a message sent from PCA to PCB reaches router R2, some frame header fields will
be rewritten by R2 before forwarding to switch S2. The frames will contain the source MAC address of
router R2 and the destination MAC address of PCB. The frames will retain the original IPv4 addressing
applied by PCA which is the IPv4 address of PCA as the source address and the IPv4 address of PCB as
the destination.
6. A cybersecurity analyst needs to collect alert data. What are three detection tools to perform this
task in the Security Onion architecture? (Choose three.)
CapME
Wazuh
Kibana
Zeek
Sguil
Wireshark
Detection tools in Security Onion Architecture include: CapME, Snort, Zeek, OSSEC, Wazuh, Suricata.
8. In network security assessments, which type of test is used to evaluate the risk posed by
vulnerabilities to a specific
organization including assessment of the likelihood of attacks and the impact of successful exploits on
the organization?
port scanning
risk analysis
penetration testing
vulnerability assessment
Explanation: A risk analysis includes assessment of the likelihood of attacks, identifies types of likely
threat actors, and evaluates the impact of successful exploits on the organization.
9. Match the server profile element to the description. (Not all options are used.)
Explanation: The elements of a server profile include the following:Listening ports – the TCP and UDP
daemons and ports that are allowed to be open on the server
Service accounts – the definitions of the type of service that an application is allowed to run on a
given host
Software environment – the tasks, processes, and applications that are permitted to run on the server
10. In addressing an identified risk, which strategy aims to shift some of the risk to other parties?
risk avoidance
risk sharing
risk retention
risk reduction
Explanation: There are four potential strategies for responding to risks that have been identified:
a technology used to provide real-time reporting and long-term analysis of security events
a Cisco technology that provides statistics on packets flowing through a router or multilayer switch
a feature supported on Cisco switches that enables the switch to copy frames and forward them to an
analysis device
a passive device that forwards all traffic and physical layer errors to an analysis device
Explanation: A network tap is used to capture traffic for monitoring the network. The tap is typically a
passive splitting device implemented inline on the network and forwards all traffic, including physical
layer errors, to an analysis device.
13. If a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be
considered within its goal?
Explanation: Within a year, there are 365 days x 24 hours a day x 60 minutes per hour = 525,600
minutes. With the goal of uptime 99.999% of time, the downtime needs to be controlled under
525,600 x (1-0.99999) = 5.256 minutes a year.
14. The HTTP server has responded to a client request with a 200 status code. What does this status
code indicate?
The request is understood by the server, but the resource will not be fulfilled.
The server could not find the requested resource, possibly because of an incorrect URL.
The request has been accepted for processing, but processing is not completed.
15. What is an advantage for small organizations of adopting IMAP instead of POP?
POP only allows the client to store messages in a centralized way, while IMAP allows distributed
storage.
IMAP sends and retrieves email, but POP only retrieves email.
When the user connects to a POP server, copies of the messages are kept in the mail server for a
short time, but IMAP keeps them for a long time.
Messages are kept in the mail servers until they are manually deleted from the email client.
Explanation: IMAP and POP are protocols that are used to retrieve email messages. The advantage of
using IMAP instead of POP is that when the user connects to an IMAP-capable server, copies of the
messages are downloaded to the client application. IMAP then stores the email messages on the
server until the user manually deletes those messages.
16. What debugging security tool can be used by black hats to reverse engineer binary files when
writing exploits?
WinDbg
Firesheep
Skipfish
AIDE
17. Match the attack tools with the description. (Not all options are used.)
When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine
the mapping of IP addresses to MAC addresses.
If a host is ready to send a packet to a local destination device and it has the IP address but not the
MAC address of the destination, it generates an ARP broadcast.
If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.
If no device responds to the ARP request, then the originating node will broadcast the data packet to
all devices on the network segment.
An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the
destination host and the multicast MAC address.
Explanation: When a node encapsulates a data packet into a frame, it needs the destination MAC
address. First it determines if the destination device is on the local network or on a remote network.
Then it checks the ARP table (not the MAC table) to see if a pair of IP address and MAC address exists
for either the destination IP address (if the destination host is on the local network) or the default
gateway IP address (if the destination host is on a remote network). If the match does not exist, it
generates an ARP broadcast to seek the IP address to MAC address resolution. Because the
destination MAC address is unknown, the ARP request is broadcast with the MAC address
FFFF.FFFF.FFFF. Either the destination device or the default gateway will respond with its MAC
address, which enables the sending node to assemble the frame. If no device responds to the ARP
request, then the originating node will discard the packet because a frame cannot be created.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
Every operating system uses the same timer to remove old entries from the ARP cache.
Static IP-to-MAC address entries are removed dynamically from the ARP table.
to securely connect to a remote network over an unsecure link such as an Internet connection
to donate processor cycles to distributed computational tasks in a processor sharing P2P network
to inspect incoming traffic and look for any that violates a rule or matches the signature of a known
exploit
Explanation: Tor is a software platform and network of peer-to-peer (P2P) hosts that function as
routers. Users access the Tor network by using a special browserthat allows them to browse
anonymously.
21. Which two network protocols can be used by a threat actor to exfiltrate data in traffic that is
disguised as normal network traffic? (Choose two.)
NTP
DNS
HTTP
syslog
SMTP
22. What is a key difference between the data captured by NetFlow and data captured by Wireshark?
NetFlow data shows network flow contents whereas Wireshark data shows network flow statistics.
NetFlow collects metadata from a network flow whereas Wireshark captures full data packets.
Explanation: Wireshark captures the entire contents of a packet. NetFlow does not. Instead, NetFlow
collects metadata, or data about the flow.
23. Which tool captures full data packets with a command-line interface only?
nfdump
Wireshark
NBAR2
tcpdump
Explanation: The command-line tool tcpdump is a packet analyzer. Wireshark is a packet analyzer with
a GUI interface.
use SSH and disable the root account access over SSH
Explanation: The basic best practices for device hardening are as follows:
Use SSH and disable the root account login over SSH.
25. In a Linux operating system, which component interprets user commands and attempts to
execute them?
GUI
daemon
kernel
shell
26. A network administrator is configuring an AAA server to manage RADIUS authentication. Which
two features are included in RADIUS authentication? (Choose two.)
Utilizes UDP
Vulnerabilities in systems are exploited to grant higher levels of privilege than someone or some
process should have.
Everyone is given full rights by default to everything and rights are taken away only when someone
abuses privileges.
Explanation: With privilege escalation, vulnerabilities are exploited to grant higher levels of privilege.
After the privilege is granted, the threat actor can access sensitive information or take control of the
system.
28. What two assurances does digital signing provide about code that is downloaded from the
Internet? (Choose two.)
The code has not been modified since it left the software publisher.
The code was encrypted with both a private and public key.
Explanation: Digitally signing code provides several assurances about the code:
The code has not been modified since it left the software publisher.
The publisher undeniably published the code. This provides nonrepudiation of the act of publishing.
29. An IT enterprise is recommending the use of PKI applications to securely exchange information
between the employees. In which two cases might an organization use PKI applications to securely
exchange information between users? (Choose two.)
802.1x authentication
FTP transfers
Explanation: The Public Key Infrastructure (PKI) is a third party-system referred to as a certificate
authority or CA. The PKI is the framework used to securely exchange information between parties.
Common PKI applications are as follows:
30. Which measure can a security analyst take to perform effective security monitoring against
network traffic encrypted by SSL technology?
Explanation: Deploy a Cisco SSL Appliance to decrypt SSL traffic and send it to intrusion prevention
system (IPS) appliances to identify risks normally hidden by SSL.
31. An administrator is trying to develop a BYOD security policy for employees that are bringing a
wide range of devices to connect to the company network. Which three objectives must the BYOD
security policy address? (Choose three.)
All devices must be insured against liability if used to compromise the corporate network.
All devices must have open authentication with the corporate network.
Safeguards must be put in place for any personal device being compromised.
The level of access of employees when connecting to the corporate network must be defined.
32. Match the security policy with the description. (Not all options are used.)
33. Match the attack to the definition. (Not all options are used.)
34. What type of attack targets an SQL database using the input field of a user?
XML injection
buffer overflow
Cross-site scripting
SQL injection
Explanation: A criminal can insert a malicious SQL statement in an entry field on a website where the
system does not filter the user input correctly.
35. What are two characteristics of Ethernet MAC addresses? (Choose two.)
MAC addresses must be unique for both Ethernet and serial interfaces on a device.
36. A user calls to report that a PC cannot access the internet. The network technician asks the user
to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result
is four positive replies. What conclusion can be drawn based on this connectivity test?
The PC can access the network. The problem exists beyond the local network.
The PC can access the Internet. However, the web browser may not work.
Explanation: The ping 127.0.0.1 command is used to verify that the TCP/IP stack is functional. It
verifies the proper operation of the protocol stack from the network layer to physical layer, without
sending a signal on the media. That is, this test does not go beyond the PC itself. For example, it does
not detect whether a cable is connected to the PC or not.
37. What characterizes a threat actor?
38. A computer is presenting a user with a screen requesting payment before the user data is allowed
to be accessed by the same user. What type of malware is this?
a type of virus
a type of worm
a type of ransomware
Explanation: Ransomware commonly encrypts data on a computer and makes the data unavailable
until the computer user pays a specific sum of money
39. Which ICMPv6 message type provides network addressing information to hosts that use SLAAC?
router solicitation
neighbor advertisement
neighbor solicitation
router advertisement
Explanation: IPv6-enabled router interfaces send periodic router advertisement messages that
provide addressing information to hosts that perform SLAAC.
40. Which tol included in the Security Onion is a series of software plugins that send different types of
data to the Elasticsearch data stores?
Curator
Beats
OSSEC
ElastAlert
41. Which two types of unreadable network traffic could be eliminated from data collected by NSM?
(Choose two.)
STP traffic
IPsec traffic
SSL traffic
broadcast traffic
Explanation: To reduce the huge amount of data collected so that cybersecurity analysts can focus on
critical threats, some less important or unusable data could be eliminated from the datasets. For
example, encrypted data, such as IPsec and SSL traffic, could be eliminated because it is unreadable in
a reasonable time frame.
42. Which core open source component of the Elastic-stack is responsible for accepting the data in its
native format and making elements of the data consistent across all sources?
Logstash
Kibana
Beats
Elasticsearch
44. In the NIST incident response process life cycle, which type of attack vector involves the use of
brute force against devices, networks, or services?
media
impersonation
attrition
loss or theft
Explanation: Common attack vectors include media, attrition, impersonation, and loss or theft.
Attrition attacks are any attacks that use brute force. Media attacks are those initiated from storage
devices. Impersonation attacks occur when something or someone is replaced for the purpose of the
attack, and loss or theft attacks are initiated by equipment inside the organization.
45. Match the security organization with its security functions. (Not all options are used.)
It enables the real-time exchange of cyberthreat indicators between the U.S. Federal Government
and the private sector.
It is the specification for an application layer protocol that allows the communication of CTI over
HTTPS.
Explanation: CybOX is an open standards set of standardized schemata for specifying, capturing,
characterizing, and communicating events and properties of network operations that support many
cybersecurity functions.
47. After host A receives a web page from server B, host A terminates the connection with server B.
Match each step to its correct option in the normal termination process for a TCP connection. (Not all
options are used.)
48. What are two ways that ICMP can be a security threat to a company? (Choose two.)
49. Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.)
fragment offset
protocol
flag
TTL
identification
version
Explanation: Unlike IPv4, IPv6 routers do not perform fragmentation. Therefore, all three fields
supporting fragmentation in the IPv4 header are removed and have no equivalent in the IPv6 header.
These three fields are fragment offset, flag, and identification. IPv6 does support host packet
fragmentation through the use of extension headers, which are not part of the IPv6 header.
50. Which two net commands are associated with network resource sharing? (Choose two.)
net start
net accounts
net share
net use
net stop
Explanation:
The net command is a very important command. Some common net commands include these:
net session – lists or disconnects sessions between a computer and other computers on the network
net view – shows a list of computers and network devices on the network
51. Match the Windows 10 Registry key with its description. (Not all options are used.)
52. Which PDU format is used when bits are received from the network medium by the NIC of a host?
segment
file
packet
frame
Explanation: When received at the physical layer of a host, the bits are formatted into a frame at the
data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer.
A file is a data structure that may be used at the application layer.
53. A user is executing a tracert to a remote device. At what point would a router, which is in the path
to the destination device, stop forwarding the packet?
when the values of both the Echo Request and Echo Reply messages reach zero
Explanation: When a router receives a traceroute packet, the value in the TTL field is decremented by
1. When the value in the field reaches zero, the receiving router will not forward the packet, and will
send an ICMP Time Exceeded message back to the source.
54. Refer to the exhibit. What solution can provide a VPN between site A and site B to support
encapsulation of any Layer 3 protocol between the internal networks at each site?
an IPsec tunnel
a GRE tunnel
Explanation: A Generic Routing Encapsulation (GRE) tunnel is a non-secure, site-to-site VPN tunneling
solution that is capable of encapsulating any Layer 3 protocol between multiple sites across over an IP
internetwork.
55. For what purpose would a network administrator use the Nmap tool?
Explanation: Nmap allows an administrator to perform port scanning to probe computers and the
network for open ports. This helps the administrator verify that network security policies are in place.
57. A client application needs to terminate a TCP communication session with a server. Place the
termination process steps in the order that they will occur. (Nat all options are used.)
59. Match the Linux host-based firewall application with its description.
60. What network attack seeks to create a DoS for clients by preventing them from being able to
obtain a DHCP lease?
DHCP starvation
IP address spoofing
DHCP spoofing
Explanation: DCHP starvation attacks are launched by an attacker with the intent to create a DoS for
DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER
messages in order to lease the entire pool of available IP addresses, thus denying them to legitimate
hosts.
61. Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model
would be used?
Explanation: The TCP/IP model contains the application, transport, internet, and network access
layers. A file transfer uses the FTP application layer protocol. The data would move from the
application layer through all of the layers of the model and across the network to the file server.
62. A company has a file server that shares a folder named Public. The network security policy
specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server
while the Edit rights are assigned only to the network admin group. Which component is addressed in
the AAA network service framework?
automation
authentication
authorization
accounting
Explanation: After a user is successfully authenticated (logged into the server), the authorization is
the process of determining what network resources the user can access and what operations (such as
read or edit) the user can perform.
63. Match the destination network routing table entry type with a defintion.
64. A person coming to a cafe for the first time wants to gain wireless access to the Internet using a
laptop. What is the first step the wireless client will do in order to communicate over the network
using a wireless management frame?
authenticate to the AP
discover the AP
Discover the AP
2001:0db8:cafe:4500:1000
2001:0db8:cafe:4500:1000:00d8:0058:00ab
1000:00d8:0058:00ab
2001:0db8:cafe:4500
2001
Explanation: The address has a prefix length of /64. Thus the first 64 bits represent the network
portion, whereas the last 64 bits represent the host portion of the IPv6 address.
66. An administrator wants to create four subnetworks from the network address 192.168.1.0/24.
What is the network address and subnet mask of the second useable subnet?
subnetwork 192.168.1.64
subnetwork 192.168.1.64
subnetwork 192.168.1.32
subnetwork 192.168.1.128
subnetwork 192.168.1.8
Explanation: The number of bits that are borrowed would be two, thus giving a total of 4 useable
subnets:
192.168.1.0
192.168.1.64
192.168.1.128
192.168.1.192
Because 2 bits are borrowed, the new subnet mask would be /26 or 255.255.255.192
67. What term describes a set of software tools designed to increase the privileges of a user or to
grant access to the user to portions of the operating system that should not normally be allowed?
compiler
rootkit
package manager
penetration testing
68. The IT security personnel of an organization notice that the web server deployed in the DMZ is
frequently targeted by threat actors. The decision is made to implement a patch management system
to manage the server. Which risk management strategy method is being used to respond to the
identified risk?
risk sharing
risk avoidance
risk reduction
risk retention
Explanation: There are four potential strategies for responding to risks that have been identified:
69. What are three characteristics of an information security management system? (Choose three.)
It involves the implementation of systems that track the location and configuration of networked
devices and software across an enterprise.
It addresses the inventory and control of hardware and software configurations of systems.
It consists of a set of practices that are systematically applied to ensure continuous improvement in
information security.
It consists of a management framework through which an organization identifies, analyzes, and
addresses information security risks.
ISMSs are a natural extension of the use of popular business models, such as Total Quality
Management (TQM) and Control Objectives for Information and Related Technologies (COBIT), into
the realm of cybersecurity.
70. Which three technologies should be included in a SOC security information and event
management system? (Choose three.)
security monitoring
user authentication
proxy service
intrusion prevention
threat intelligence
• Security monitoring
• Security control
• Log management
• Vulnerability assessment
• Vulnerability tracking
• Threat intelligence
Proxy server, VPN, and IPS are security devices deployed in the network infrastructure.
71. What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
http
www
.com
index
http = protocol
sending bulk email to individuals, lists, or domains with the intention to prevent users from accessing
email
sending abnormally large amounts of data to a remote server to prevent user access to the server
services
intercepting traffic between two hosts or inserting false information into traffic between two hosts
making data appear to come from a source that is not the actual source
73. A newly created company has fifteen Windows 10 computers that need to be installed before the
company can open for business. What is a best practice that the technician should implement when
configuring the Windows Firewall?
The technician should remove all default firewall rules and selectively deny traffic from reaching the
company network.
After implementing third party security software for the company, the technician should verify that
the Windows Firewall is disabled.
The technician should create instructions for corporate users on how to allow an app through the
WIndows Firewall using the Administrator account.
The technician should enable the Windows Firewall for inbound traffic and install other firewall
software for outbound traffic control.
Explanation: Only disable Windows Firewall if other firewall software is installed. Use the Windows
Firewall (Windows 7 or 8) or the Windows Defender Firewall (Windows 10) Control Panel to enable or
disable the Windows Firewall.
74. Which statement defines the difference between session data and transaction data in logs?
Session data analyzes network traffic and predicts network behavior, whereas transaction data
records network sessions.
Session data is used to make predictions on network behaviors, whereas transaction data is used to
detect network anomalies.
Session data records a conversation between hosts, whereas transaction data focuses on the result of
network sessions.
Session data shows the result of a network session, whereas transaction data is in response to
network threat traffic.
75. Match the network monitoring data type with the description.
76. Which device supports the use of SPAN to enable monitoring of malicious activity?
Cisco IronPort
Cisco NAC
Explanation: SPAN is a Cisco technology that allows all of the traffic from one port to be redirected to
another port.
77. Which term is used for describing automated queries that are useful for adding efficiency to the
cyberoperations workflow?
playbook
chain of custody
rootkit
Explanation: A playbook is an automated query that can add efficiency to the cyberoperations
workflow.
78. When ACLs are configured to block IP address spoofing and DoS flood attacks, which ICMP
message should be allowed both inbound and outbound?
echo reply
unreachable
source quench
echo
79. After a security monitoring tool identifies a malware attachment entering the network, what is
the benefit of performing a retrospective analysis?
A retrospective analysis can help in tracking the behavior of the malware from the identification point
forward.
Explanation: General security monitoring can identify when a malware attachment enters a network
and which host is first infected. Retrospective analysis takes the next step and is the tracking of the
behavior of the malware from that point forward.
80. Which two data types would be classified as personally identifiable information (PII)? (Choose
two.)
Facebook photographs
81. A help desk technician notices an increased number of calls relating to the performance of
computers located at the manufacturing plant. The technician believes that botnets are causing the
issue. What are two purposes of botnets? (Choose two.)
to transmit viruses or spam to computers on the same network
Explanation: Botnets can be used to perform DDoS attacks, obtain data, or transmit malware to other
devices on the network.
82. Which two statements describe the use of asymmetric algorithms? (Choose two.)
If a public key is used to encrypt the data, a private key must be used to decrypt the data.
If a public key is used to encrypt the data, a public key must be used to decrypt the data.
If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a private key is used to encrypt the data, a private key must be used to decrypt the data.
Explanation: Asymmetric algorithms use two keys: a public key and a private key. Both keys are
capable of the encryption process, but the complementary matched key is required for decryption. If
a public key encrypts the data, the matching private key decrypts the data. The opposite is also true.
If a private key encrypts the data, the corresponding public key decrypts the data.
83. Which three security services are provided by digital signatures? (Choose three.)
Explanation: Digital signatures are a mathematical technique used to provide three basic security
services. Digital signatures have specific properties that enable entity authentication and data
integrity. In addition, digital signatures provide nonrepudiation of the transaction. In other words, the
digital signature serves as legal proof that the data exchange did take place.
84. What are two methods to maintain certificate revocation status? (Choose two.)
CRL
DNS
subordinate CA
OCSP
LDAP
Explanation: A digital certificate might need to be revoked if its key is compromised or it is no longer
needed. The certificate revocation list (CRL) and Online Certificate Status Protocol (OCSP), are two
common methods to check a certificate revocation status.
85. What are two uses of an access control list? (Choose two.)
ACLs can permit or deny traffic based upon the MAC address originating on the router.
Explanation: ACLs can be used for the following:Limit network traffic in order to provide adequate
network performance
86. A client is using SLAAC to obtain an IPv6 address for the interface. After an address has been
generated and applied to the interface, what must the client do before it can begin to use this IPv6
address?
It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use.
It must send an ICMPv6 Router Solicitation message to request the address of the DNS server.
It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in
use on the network.
It must wait for an ICMPv6 Router Advertisement message giving permission to use this address.
Explanation: Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless Address
Autoconfiguration (SLAAC) does not. A SLAAC client can automatically generate an address that is
based on information from local routers via Router Advertisement (RA) messages. Once an address
has been assigned to an interface via SLAAC, the client must ensure via Duplicate Address Detection
(DAD) that the address is not already in use. It does this by sending out an ICMPv6 Neighbor
Solicitation message and listening for a response. If a response is received, then it means that
another device is already using this address.
87. A technician is troubleshooting a network connectivity problem. Pings to the local wireless router
are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist
the technician to find the location of the networking problem?
tracert
ipconfig
msconfig
ipconfig/renew
Explanation: The tracert utlility (also known as the tracert command or tracert tool) will enable the
technician to locate the link to the server that is down. The ipconfig command displays the computer
network configuration details. The ipconfig/renew command requests an IP address from a DHCP
server. Msconfig is not a network troubleshooting command.
88. What are two evasion techniques that are used by hackers? (Choose two.)
Trojan horse
pivot
rootkit
reconnaissance
phishing
Explanation: The following methods are used by hackers to avoid detection:Encryption and tunneling
– hide or scramble the malware content
Resource exhaustion – keeps the host device too busy to detect the invasion
Rootkit – allows the hacker to be undetected and hides software installed by the hacker
89. When a security attack has occurred, which two approaches should security professionals take to
mitigate a compromised system during the Actions on Objectives step as defined by the Cyber Kill
Chain model? (Choose two.)
Explanation: When security professionals are alerted about the system compromises, forensic
analysis of endpoints should be performed immediately for rapid triage. In addition, detection efforts
for further attacking activities such as data exfiltration, lateral movement, and unauthorized
credential usage should be enhanced to reduce damage to the minimum.
90. Place the seven steps defined in the Cyber Kill Chain in the correct order.
91. Which field in the TCP header indicates the status of the three-way handshake process?
control bits
window
reserved
checksum
Explanation: The value in the control bits field of theTCP header indicates the progress and status of
the connection.
92. A user opens three browsers on the same PC to access www.cisco.com to search for certification
course information. The Cisco web server sends a datagram as a reply to the request from one of the
web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of
the three web browsers should receive the reply?
Explanation: Each web browser client application opens a randomly generated port number in the
range of the registered ports and uses this number as the source port number in the datagram that it
sends to a server. The server then uses this port number as the destination port number in the reply
datagram that it sends to the web browser. The PC that is running the web browser application
receives the datagram and uses the destination port number that is contained in this datagram to
identify the client application.
93. What are two scenarios where probabilistic security analysis is best suited? (Choose two.)
when random variables create difficulty in knowing with certainty the outcome of any given event
when analyzing events with the assumption that they follow predefined steps
Explanation: Probabilistic analysis relies on statistical techniques that are designed to estimate the
probability that an event will occur based on the likelihood that prior events will occur.
94. Which tool is a web application that provides the cybersecurity analyst an easy-to-read means of
viewing an entire Layer 4 session?
Snort
Zeek
CapME
OSSEC
95. Match the category of attacks with the description. (Not all options are used.)
96. What are two characteristics of the SLAAC method for IPv6 address configuration? (Choose two.)
The default gateway of an IPv6 client on a LAN will be the link-local address of the router interface
attached to the LAN.
This stateful method of acquiring an IPv6 address requires at least one DHCPv6 server.
Clients send router advertisement messages to routers to request IPv6 addressing.
Router solicitation messages are sent by the router to offer IPv6 addressing to clients.
Explanation: With SLAAC, the default gateway for IPv6 clients will be the link-local address of the
router interface that is attached to the client LAN. The IPv6 addressing is dynamically assigned via the
ICMPv6 protocol. SLAAC is a stateless method of acquiring an IPv6 address, a method that requires no
servers. When a client is configured to obtain its addressing information automatically via SLAAC, the
client sends a router solicitation message to the IPv6 all-routers multicast address FF02::2. The router
advertisement messages are sent by routers to provide addressing information to clients.
97. A technician notices that an application is not responding to commands and that the computer
seems to respond slowly when applications are opened. What is the best administrative tool to force
the release of system resources from the unresponsive application?
Event Viewer
System Restore
Task Manager
Explanation: Use the Task Manager Performance tab to see a visual representation of CPU and RAM
utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt
an application that is not responding.
98. How can statistical data be used to describe or predict network behavior?
Explanation: Statistical data is created through the analysis of other forms of network data. Statistical
characteristics of normal network behavior can be compared to current network traffic in an effort to
detect anomalies. Conclusions resulting from analysis can be used to describe or predict network
behavior.
99. Which metric in the CVSS Base Metric Group is used with an attack vector?
the proximity of the threat actor to the vulnerability
the presence or absence of the requirement for user interaction in order for an exploit to be
successful
the determination whether the initial authority changes to a second authority during the exploit
the number of components, software, hardware, or networks, that are beyond the control of the
attacker and that must be present in order for a vulnerability to be successfully exploited
Explanation: This is a metric that reflects the proximity of the threat actor to the vulnerable
component. The more remote the threat actor is to the component, the higher the severity. Threat
actors close to your network or inside your network are easier to detect and mitigate.
100. Which NIST Cybersecurity Framework core function is concerned with the development and
implementation of safeguards that ensure the delivery of critical infrastructure services?
respond
detect
identify
recover
protect
101. Which two techniques are used in a smurf attack? (Choose two.)
session hijacking
resource exhaustion
botnets
amplification
reflection
Explanation: A smurf attack uses amplification and reflection techniques to overwhelm a targeted
host. The threat actor forwards ICMP echo request messages that contain the source IP address of
the victim to a large number of hosts. These hosts all reply to the spoofed IP address of the victim
with the intent of overwhelming it.
to aggregate the data in one place and present it in a comprehensible and usable format
to provide a specification for an application layer protocol that allows the communication of CTI over
HTTPS
to provide a standardized schema for specifying, capturing, characterizing, and communicating events
and properties of network operations
to provide a security operations platform that integrates and enhances diverse security tools and
threat intelligence
Explanation: A threat intelligence platform (TIP) centralizes the collection of threat data from
numerous data sources and formats. TIP is designed to aggregate the data in one place and present it
in a comprehensible and usable format. This is especially important as the volume of threat
intelligence data can be overwhelming.
103. Which wireless parameter is used by an access point to broadcast frames that include the SSID?
security mode
active mode
passive mode
channel setting
Explanation: The two scanning or probing modes an access point can be placed into are passive or
active. In passive mode, the AP advertises the SSID, supported standards, and security settings in
broadcast beacon frames. In active mode, the wireless client must be manually configured for the
same wireless parameters as the AP has configured.
104. Match the field in the Event table of Sguil to the description.
105. An employee connects wirelessly to the company network using a cell phone. The employee
then configures the cell phone to act as a wireless access point that will allow new employees to
connect to the company network. Which type of security threat best describes this situation?
cracking
denial of service
spoofing
Explanation: Configuring the cell phone to act as a wireless access point means that the cell phone is
now a rogue access point. The employee unknowingly breached the security of the company network
by allowing a user to access the network without connecting through the company access point.
Cracking is the process of obtaining passwords from data stored or transmitted on a network. Denial
of service attacks refer to sending large amounts of data to a networked device, such as a server, to
prevent legitimate access to the server. Spoofing refers to access gained to a network or data by an
attacker appearing to be a legitimate network device or user.
107. Which two statements describe the characteristics of symmetric algorithms? (Choose two.)
Explanation: Symmetric encryption algorithms use the same key (also called shared secret) to encrypt
and decrypt the data. In contrast, asymmetric encryption algorithms use a pair of keys, one for
encryption and another for decryption.
With HIPS, the network administrator must verify support for all the different operating systems used
in the network.
HIPS has difficulty constructing an accurate network picture or coordinating events that occur across
the entire network.
If the network traffic stream is encrypted, HIPS is unable to access unencrypted forms of the traffic.
109. What are three functions provided by the syslog service? (Choose three.)
to select the type of logging information that is captured
Explanation: There are three primary functions provided by the syslog service:
Enable the highest level of syslog available to ensure logging of all possible event messages.
Synchronize clocks on all network devices with a protocol such as Network Time Protocol.
Log all messages to the system buffer so that they can be displayed when accessing the router.
111. What are the two ways threat actors use NTP? (Choose two.)
They attack the NTP infrastructure in order to corrupt the information used to log the attack.
They encode stolen data as the subdomain portion where the nameserver is under control of an
attacker.
Explanation: Threat actors may attempt to attack the NTP infrastructure in order to corrupt time
information used to correlate logged network events. This can serve to obfuscate traces of ongoing
exploits. In addition, threat actors have been known to use NTP systems to direct DDoS attacks
through vulnerabilities in client or server software. While these attacks do not necessarily result in
corrupted security monitoring data, they can disrupt network availability.
112. Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)
password encryption
SIP support
802.1X support
Explanation: Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all
communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+
supports separation of authentication and authorization processes, while RADIUS combines
authentication and authorization as one process. RADIUS supports remote access technology, such as
802.1x and SIP; TACACS+ does not.
114. What are two types of attacks used on DNS open resolvers? (Choose two.)
fast flux
ARP poisoning
resource utilization
cushioning
Explanation: Three types of attacks used on DNS open resolvers are as follows:DNS cache poisoning –
attacker sends spoofed falsified information to redirect users from legitimate sites to malicious sites
DNS amplification and reflection attacks – attacker sends an increased volume of attacks to mask the
true source of the attack
DNS resource utilization attacks – a denial of service (DoS) attack that consumes server resources
115. What are three goals of a port scan attack? (Choose three.)
116. Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-
server communication?
HTTP
FTP
DNS
SMTP
Explanation: Some applications may use both TCP and UDP. DNS uses UDP when clients send requests
to a DNS server, and TCP when two DNS serves directly communicate.
117. What is one difference between the client-server and peer-to-peer network models?
A data transfer that uses a device serving in a client role requires that a dedicated server be present.
A peer-to-peer network transfers data faster than a transfer using a client-server network.
Explanation: Data transfer speeds depend on a number of factors including the amount of traffic, the
quality of service imposed, and the network media. Transfer speeds are not dependent on the
network model type. File transfers can occur using the client-server model or the peer-to-peer model.
A data transfer between a device acting in the client role and a device acting in the server role can
occur in both peer-to-peer and client-server networks.
They define how messages are exchanged between the source and the destination.
They are only required for exchange of messages between devices on remote networks.
Network protocols define the type of hardware that is used and how it is mounted in racks.
Explanation: Network protocols are implemented in hardware, or software, or both. They interact
with each other within different layers of a protocol stack. Protocols have nothing to do with the
installation of the network equipment. Network protocols are required to exchange information
between source and destination devices in both local and remote networks.
119. Which approach can help block potential malware delivery methods, as described in the Cyber
Kill Chain model, on an Internet-faced web server?
Explanation: A threat actor may send the weapon through web interfaces to the target server, either
in file uploads or coded web requests. By analyzing the infrastructure storage path used for files,
security measures can be implemented to monitor and detect malware deliveries through these
methods.
120. Which meta-feature element in the Diamond Model classifies the general type of intrusion
event?
phase
results
methodology
direction
Explanation: Methodology – This is used to classify the general type of event, such as port scan,
phishing, content delivery attack, syn flood, etc.
chrootkit
ls
grep
kill
Explanation: The kill command is used to stop, restart, or pause a process. The chrootkit command is
used to check the computer for rootkits, a set of software tools that can increase the privilege level of
a user or grant access to portions of software normally not allowed. The grep command is used to
look for a file or text within a file. The ls command is used to list files, directories, and file
information.
122. Which tool can be used in a Cisco AVC system to analyze and present the application analysis
data into dashboard reports?
NetFlow
NBAR2
Prime
IPFIX
Explanation: A management and reporting system, such as Cisco Prime, can be used to analyze and
present the application analysis data into dashboard reports for use by network monitoring
personnel.
123. Which Windows Event Viewer log includes events regarding the operation of drivers, processes,
and hardware?
system logs
application logs
security logs
setup logs
System logs – events about the operation of drivers, processes, and hardware
Setup logs – information about the installation of software, including Windows updates
Security logs – events related to security, such as logon attempts and operations related to file or
object management and access
Explanation: Network data can be encrypted using various cryptography applications so that the data
is made unreadable to unauthorized users. Authorized users have the cryptography application so the
data can be unencrypted.
125. Match the tabs of the Windows 10 Task Manager to their functions. (Not all options are used.)
126. For network systems, which management system addresses the inventory and control of
hardware and software configurations?
asset management
vulnerability management
risk management
configuration management
Explanation: Configuration management addresses the inventory and control of hardware and
software configurations of network systems.
127. Match the common network technology or protocol with the description. (Not all options are
used.)
128. What are the three core functions provided by the Security Onion? (Choose three.)
alert analysis
intrusion detection
threat containment
Explanation: Security Onion is an open source suite of Network Security Monitoring (NSM) tools for
evaluating cybersecurity alerts. For cybersecurity analysts the Security Onion provides full packet
capture, network-based and host-based intrusion detection systems, and alert analysis tools.
129. In NAT terms, what address type refers to the globally routable IPv4 address of a destination
host on the Internet?
outside global
inside global
outside local
inside local
Explanation: From the perspective of a NAT device, inside global addresses are used by external users
to reach internal hosts. Inside local addresses are the addresses assigned to internal hosts. Outside
global addresses are the addresses of destinations on the external network. Outside local addresses
are the actual private addresses of destination hosts behind other NAT devices.
130. Which two fields or features does Ethernet examine to determine if a received frame is passed
to the data link layer or discarded by the NIC? (Choose two.)
CEF
auto-MDIX
Explanation: An Ethernet frame is not processed and is discarded if it is smaller than the minimum
(64 bytes) or if the calculated frame check sequence (FCS) value does not match the received FCS
value. Auto-MDIX (automatic medium-dependent interface crossover) is Layer 1 technology that
detects cable straight-through or crossover types. The source MAC address is not used to determine
how the frame is received. CEF (Cisco Express Forwarding) is a technology used to expedite Layer 3
switching.
memory registers
log files
temp files
Explanation: Volatile data is data stored in memory such as registers, cache, and RAM, or it is data
that exists in transit. Volatile memory is lost when the computer loses power.
132. What is the main purpose of exploitations by a threat actor through the weapon delivered to a
target during the Cyber Kill Chain exploitation phase?
Launch a DoS attack.
Explanation: After the weapon has been delivered, the threat actor uses it to break the vulnerability
and gain control of the target. The threat actor will use an exploit that gains the effect desired, does it
quietly, and avoids detections. Establishing a back door in the target system is the phase of
installation.
133. Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and
PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should
the administrator begin troubleshooting?
R1
PC2
SW2
R2
SW1
Explanation: Tracert is used to trace the path a packet takes. The only successful response was from
the first device along the path on the same LAN as the sending host. The first device is the default
gateway on router R1. The administrator should therefore start troubleshooting at R1.
134. What three security tools does Cisco Talos maintain security incident detection rule sets for?
(Choose three.)
Snort
NetStumbler
Socat
SpamCop
ClamAV
Explanation: Talos maintains the security incident detection rule sets for the Snort.org, ClamAV, and
SpamCop network security tools.
135. Which host-based firewall uses a three-profile approach to configure the firewall functionality?
Windows Firewall
iptables
TCP Wrapper
nftables
136. When a user visits an online store website that uses HTTPS, the user browser queries the CA for
a CRL. What is the purpose of this query?
Explanation: A digital certificate must be revoked if it is invalid. CAs maintain a certificate revocation
list (CRL), a list of revoked certificate serial numbers that have been invalidated. The user browser will
query the CRL to verify the validity of a certificate.
137. Which step in the Vulnerability Management Life Cycle determines a baseline risk profile to
eliminate risks based on asset criticality, vulnerability threat, and asset classification?
discover
assess
prioritize assets
verify
Explanation: The steps in the Vulnerability Management Life Cycle include these:
Discover – inventory all assets across the network and identify host details, including operating
systems and open services, to identify vulnerabilities
Prioritize assets – categorize assets into groups or business units, and assign a business value to asset
groups based on their criticality to business operations
Assess – determine a baseline risk profile to eliminate risks based on asset criticality, vulnerability
threats, and asset classification
Report – measure the level of business risk associated with assets according to security policies.
Document a security plan, monitor suspicious activity, and describe known vulnerabilities.
Remediate – prioritize according to business risk and fix vulnerabilities in order of risk
Verify – verify that threats have been eliminated through follow-up audits
138. Which management system implements systems that track the location and configuration of
networked devices and software across an enterprise?
asset management
vulnerability management
risk management
configuration management
Explanation: Asset management involves the implementation of systems that track the location and
configuration of networked devices and software across an enterprise.
139. A network administrator is reviewing server alerts because of reports of network slowness. The
administrator confirms that an alert was an actual security incident. What is the security alert
classification of this type of scenario?
false negative
true positive
true negative
false positive
Explanation: True Positive: The alert has been verified to be an actual security incident.
False Positive: The alert does not indicate an actual security incident. Benign activity that results in a
false positive is sometimes referred to as a benign trigger.
140. Which application layer protocol is used to provide file-sharing and print services to Microsoft
applications?
SMTP
HTTP
SMB
DHCP
Explanation: SMB is used in Microsoft networking for file-sharing and print services. The Linux
operating system provides a method of sharing resources with Microsoft networks by using a version
of SMB called SAMBA.
141. Which device in a layered defense-in-depth approach denies connections initiated from
untrusted networks to internal networks, but allows internal users within an organization to connect
to untrusted networks?
firewall
internal router
IPS
142. What are two potential network problems that can result from ARP operation? (Choose two.)
Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and
prevent the host from communicating on the network.
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication
delays.
Network attackers could manipulate MAC address and IP address mappings in ARP messages with the
intent of intercepting network traffic.
Multiple ARP replies result in the switch MAC address table containing entries that match the MAC
addresses of hosts that are connected to the relevant switch port.
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.
Explanation: Large numbers of ARP broadcast messages could cause momentary data
communications delays. Network attackers could manipulate MAC address and IP address mappings
in ARP messages with the intent to intercept network traffic. ARP requests and replies cause entries
to be made into the ARP table, not the MAC address table. ARP table overflows are very unlikely.
Manually configuring static ARP associations is a way to prevent, not facilitate, ARP poisoning and
MAC address spoofing. Multiple ARP replies resulting in the switch MAC address table containing
entries that match the MAC addresses of connected nodes and are associated with the relevant
switch port are required for normal switch frame forwarding operations. It is not an ARP caused
network problem.
143. Which three procedures in Sguil are provided to security analysts to address alerts? (Choose
three.)
Explanation: Sguil is a tool for addressing alerts. Three tasks can be completed in Sguil to manage
alerts:
An alert can be escalated if the cybersecurity analyst is uncertain how to handle it.
144. Match the SOC metric with the description. (Not all options apply.)
145. Which two services are provided by the NetFlow tool? (Choose two.)
QoS configuration
log analysis
network monitoring
Explanation: NetFlow efficiently provides an important set of services for IP applications including
network traffic accounting, usage-based network billing, network planning, security, denial of service
monitoring capabilities, and network monitoring.
146. An administrator discovers that a user is accessing a newly established website that may be
detrimental to company security. What action should the administrator take first in terms of the
security policy?
Ask the user to stop immediately and inform the user that this constitutes grounds for dismissal.
Revise the AUP immediately and get all users to sign the updated AUP.
Explanation: One of the most common security policy components is an AUP. This can also be
referred to as an appropriate use policy. This component defines what users are allowed and not
allowed to do on the various system components. This includes the type of traffic that is allowed on
the network. The AUP should be as explicit as possible to avoid misunderstanding.
147. Which two tasks can be performed by a local DNS server? (Choose two.)
Explanation: Two important functions of DNS are to (1) provide IP addresses for domain names such
as http://www.cisco.com, and (2) forward requests that cannot be resolved to other servers in order
to provide domain name to IP address translation. DHCP provides IP addressing information to local
devices. A file transfer protocol such as FTP, SFTP, or TFTP provides file sharing services. IMAP or POP
can be used to retrieve an email message from a server.
148. Which type of event is logged in Cisco Next-Generation IPS devices (NGIPS) using FirePOWER
Services when changes have been detected in the monitored network?
intrusion
connection
host or endpoint
network discovery
Explanation: Network discovery events in Cisco NGIPS represent changes that have been detected in
the monitored network.
149. Which two actions should be taken during the preparation phase of the incident response life
cycle defined by NIST? (Choose two.)
Acquire and deploy the tools that are needed to investigate incidents.
Meet with all involved parties to discuss the incident that took place.
Explanation: According to the guideline defined in the NIST Incident Response Life Cycle, several
actions should be taken during the preparation phase including (1) creating and training the CSIRT
and (2) acquiring and deploying the tools needed by the team to investigate incidents.
255.255.255.0
255.255.255.248
255.255.255.192
255.255.240.0
255.255.224.0
Explanation: The slash notation /20 represents a subnet mask with 20 1s. This would translate to:
11111111.11111111.11110000.0000, which in turn would convert into 255.255.240.0.
151. What is the benefit of converting log file data into a common schema?
152. Which Cisco sponsored certification is designed to provide the first step in acquiring the
knowledge and skills to work with a SOC team?
CCNA Cloud
CCNA Security
Explanation: The Cisco Certified CyberOps Associate certification provides a valuable first step in
acquiring the knowledge and skills needed to work with a SOC team. It can be a valuable part of a
career in the exciting and growing field of cybersecurity operations.
153. Which three IP addresses are considered private addresses? (Choose three.)
198.168.6.18
192.168.5.29
172.68.83.35
128.37.255.6
172.17.254.4
10.234.2.1
Explanation:The designated private IP addresses are within the three IP address ranges:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
154. When establishing a network profile for an organization, which element describes the time
between the establishment of a data flow and its termination?
session duration
total throughput
Explanation: A network profile should include some important elements, such as the following:
Total throughput – the amount of data passing from a given source to a given destination in a given
period of time
Session duration – the time between the establishment of a data flow and its termination
Ports used – a list of TCP or UDP processes that are available to accept data
Critical asset address space – the IP addresses or the logical location of essential systems or data
155. What are the stages that a wireless device completes before it can communicate over a wireless
LAN network?
discover a wireless AP, authenticate with the AP, associate with the AP
discover a wireless AP, associate with the AP, authorize with the AP
discover a wireless AP, associate with the AP, authenticate with the AP
discover a wireless AP, authorize with the AP, associate with the AP
156. Match the correct sequence of steps typically taken by a threat actor carrying out a domain
shadowing attack.
Match the correct sequence of steps typically taken by a threat actor carrying out a domain
shadowing attack
157. What are two properties of a cryptographic hash function? (Choose two.)
The input for a particular hash algorithm has to have a fixed size.
Explanation: A cryptographic hash function should have the following properties:The input can be any
length.
The hash value is relatively easy to compute for any given input.
158. Refer to the exhibit. The switches have a default configuration. Host A needs to communicate
with host D, but host A does not have the MAC address for the default gateway. Which network
devices will receive the ARP request sent by host A?
i360201v3n1_275353.png
i360201v3n1_275353.png
only host D
only router R1
Explanation: Because host A does not have the MAC address of the default gateway in the ARP table,
host A sends an ARP broadcast. The ARP broadcast would be sent to every device on the local
network. Hosts B, C, and router R1 would receive the broadcast. Router R1 would not forward the
message.
159. Which type of evidence cannot prove an IT security fact on its own?
hearsay
corroborative
best
indirect
Explanation: Indirect evidence cannot prove a fact on its own, but direct evidence can. Corroborative
evidence is supporting information. Best evidence is most reliable because it is something concrete
such as a signed contract.
precise methods that yield the same result every time by relying on predefined conditions
random variables that create difficulty in knowing the outcome of any given event with certainty
161. Why would a network administrator choose Linux as an operating system in the Security
Operations Center (SOC)?
The administrator has control over specific security functions, but not standard applications.
Linux is open source – Any person can acquire Linux at no charge and modify it to fit specific needs.
This flexibility allows analysts and administrators to tailor-build an operating system specifically for
security analysis.
162. A technician needs to verify file permissions on a specific Linux file. Which command would the
technician use?
cd
sudo
ls -l
vi
163. Which two protocols may devices use in the application process that sends email? (Choose two.)
HTTP
POP
POP3
DNS
IMAP
SMTP
Explanation: POP, POP3, and IMAP are protocols that are used to retrieve email from servers. SMTP is
the default protocol that is used to send email. DNS may be used by the sender email server to find
the address of the destination email server. HTTP is a protocol for send and receiving web pages.
164. Which file system type was specifically created for optical disk media?
ext3
HFS+
CDFS
ext2
165. A piece of malware has gained access to a workstation and issued a DNS lookup query to a CnC
server. What is the purpose of this attack?
Explanation: A piece of malware, after accessing a host, may exploit the DNS service by
communicating with command-and-control (CnC) servers and then exfiltrate data in traffic disguised
as normal DNS lookup queries. Various types of encoding, such as base64, 8-bit binary, and hex can
be used to camouflage the data and evade basic data loss prevention (DLP) measures.
166. Refer to the exhibit. Which field in the Sguil event window indicates the number of times an
event is detected for the same source and destination IP address?
CNT
Pr
ST
AlertID
Explanation: The CNT field indicates the number of times an event is detected from the same source
and destination IP address. Having a high number of events can indicated a problem with event
signatures.
167. Refer to the exhibit. The IP address of which device interface should be used as the default
gateway setting of host H1?
R1: G0/0
R2: S0/0/0
R2: S0/0/1
R1: S0/0/0
Explanation: The default gateway for host H1 is the router interface that is attached to the LAN that
H1 is a member of. In this case, that is the G0/0 interface of R1. H1 should be configured with the IP
address of that interface in its addressing settings. R1 will provide routing services to packets from H1
that need to be forwarded to remote networks.
168. According to information outlined by the Cyber Kill Chain, which two approaches can help
identify reconnaissance threats? (Choose two.)
Threat actors may use port scanning toward a web server of an organization and identify
vulnerabilities on the server. They may visit the web server to collect information about the
organization. The web server logging should be enabled and the logging data should be analyzed to
identify possible reconnaissance threats. Building playbooks by filtering and combining related web
activities by visitors can sometimes reveal the intentions of threat actors.
169. Which two ICMPv6 messages are used during the Ethernet MAC address resolution process?
(Choose two.)
router solicitation
router advertisement
neighbor solicitation
neighbor advertisement
echo request
Explanation: IPv6 uses neighbor solicitation (NS) and neighbor advertisement (NA) ICMPv6 messages
for MAC address resolution.
170. What best describes the destination IPv4 address that is used by multicasting?
a single IP multicast address that is used by all destinations in a group
a group address that shares the last 23 bits with the source IPv4 address
a 48 bit address that is determined by the number of members in the multicast group
Explain:
The destination multicast IPv4 address is a group address, which is a single IP multicast address within
the Class D range.
171. What is the result of using security devices that include HTTPS decryption and inspection
services?
The devices must have preconfigured usernames and passwords for all users.
Monthly service contracts with reputable web filtering sites can be costly.
Explanation: HTTPS adds extra overhead to the HTTP-formed packet. HTTPS encrypts using Secure
Sockets Layer (SSL). Even though some devices can perform SSL decryption and inspection, this can
present processing and privacy issues.
Using free DDNS services, threat actors can quickly and easily generate subdomains and change DNS
records.
Using DDNS, a change in an existing IP address mapping can take over 24 hours and could result in a
disruption of connectivity.
Explanation: Dynamic DNS can be abused by threat actors in various ways. Free DDNS services are
especially useful to threat actors. DDNS can be used to facilitate the rapid change of IP address for
malware command-and-control servers after the current IP address has become widely blocked.
173. Match the network-based antimalware solution to the function. (Not all options are used.)
174. A threat actor has identified the potential vulnerability of the web server of an organization and
is building an attack. What will the threat actor possibly do to build an attack weapon?
Obtain an automated tool in order to deliver the malware payload through the vulnerability.
One tactic of weaponization used by a threat actor after the vulnerability is identified is to obtain an
automated tool to deliver the malware payload through the vulnerability.
175. Which tool included in the Security Onion is a series of software plugins that send different types
of data to the Elasticsearch data stores?
OSSEC
Curator
Beats
ElastAlert
Explanation: Beats – This is a series of software plugins that send different types of data to the
Elasticsearch data stores.
176. Which term is used to describe the process of identifying the NSM-related data to be gathered?
data archiving
data normalization
data reduction
data retention
178. According to NIST, which step in the digital forensics process involves preparing and presenting
information that resulted from scrutinizing data?
examination
collection
reporting
analysis
Explanation: NIST describes the digital forensics process as involving the following four steps:
Collection – the identification of potential sources of forensic data and acquisition, handling, and
storage of that data
Examination – assessing and extracting relevant information from the collected data. This may involve
decompression or decryption of the data
Analysis – drawing conclusions from the data. Salient features, such as people, places, times, events,
and so on should be documented
Reporting – preparing and presenting information that resulted from the analysis. Reporting should
be impartial and alternative explanations should be offered if appropriate
179. Refer to the exhibit. A cybersecurity analyst is using Sguil to verify security alerts. How is the
current view sorted?
by sensor number
by source IP
by date/time
by frequency
Explanation: The CNT column, between the ST and Sensor columns, displays the frequency of alerts.
By sorting with frfequency, the analyst will get a better sense of what has happened on the network.
180. Which two options are window managers for Linux? (Choose two.)
File Explorer
Kali
Gnome
PenTesting
KDE
Explanation: The X Window System provides the basic framework for a GUI, but the GUI itself varies
greatly between different distributions. Two window managers are Gnome and KDE.
181. What are the two methods that a wireless NIC can use to discover an AP? (Choose two.)
Explanation: Two methods can be used by a wireless device to discover and register with an access
point: passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that
contains the SSID and other wireless settings. In active mode, the wireless device must be manually
configured for the SSID, and then the device broadcasts a probe request.
182. A client device has initiated a secure HTTP request to a web browser. Which well-known port
address number is associated with the destination address?
110
80
443
404
Explanation: Port numbers are used in TCP and UDP communications to differentiate between the
various services running on a device. The well-known port number used by HTTPs is port 443.
Corroborating evidence
Best evidence
Indirect evidence
Direct evidence
Explanation: Evidence can be classified as follows:
Best evidence: This is evidence that is in its original state. It might be storage devices used by an
accused or archives of files that can be proven to be unaltered.
Indirect evidence: This evidence acts in combination with other facts to establish a hypothesis.
184. Which three statements describe a DHCP Discover message? (Choose three.)
All hosts receive the message, but only a DHCP server replies.
Explanation: When a host configured to use DHCP powers up on a network it sends a DHCPDISCOVER
message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server replies with a unicast
DHCPOFFER message back to the host.
185. Refer to the exhibit. The PC is sending a packet to the Server on the remote network. Router R1
is performing NAT overload. From the perspective of the PC, match the NAT address type with the
correct IP address. (Not all options are used.)
Explanation: The inside local address is the private IP address of the source or the PC in this instance.
The inside global address is the translated address of the source or the address as seen by the outside
device. Since the PC is using the outside address of the R1 router, the inside global address is
192.0.2.1. The outside addressing is simply the address of the server or 203.0.113.5.
186. Which step in the Vulnerability Management Life Cycle categorizes assets into groups or business
units, and assigns a business value to asset groups based on their criticality to business operations?
remediate
prioritize assets
report
assess
Explanation: The steps in the Vulnerability Management Life Cycle include these:
Discover – inventory all assets across the network and identify host details, including operating
systems and open services to identify vulnerabilities
Prioritize assets – categorize assets into groups or business units, and assign a business value to asset
groups based on their criticality to business operations
Assess – determine a baseline risk profile to eliminate risks based on asset criticality, vulnerability
threats, and asset classification
Report – measure the level of business risk associated with your assets according to your security
policies. Document a security plan, monitor suspicious activity, and describe known vulnerabilities
Remediate – prioritize according to business risk and fix vulnerabilities in order of risk
Verify – verify that threats have been eliminated through follow-up audits
187. A client application needs to terminate a TCP communication session with a server. Place the
termination process steps in the order that they will occur. (Not all options are used.)
Explanation: In order to terminate a TCP session, the client sends to the server a segment with the
FIN flag set. The server acknowledges the client by sending a segment with the ACK flag set. The
server sends a FIN to the client to terminate the server to client session. The client acknowledges the
termination by sending a segment with the ACK flag set.
CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Final exam answers 189
CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Final exam answers Q189
190. What are two functions that are provided by the network layer? (Choose two.)
carrying data between processes that are running on source and destination hosts
Explanation: The network layer is primarily concerned with passing data from a source to a
destination on another network. IP addresses supply unique identifiers for the source and
destination. The network layer provides connectionless, best-effort delivery. Devices rely on higher
layers to supply services to processes.
191. Match the phase in the NIST incident response life cycle to the action.
Implement procedures to contain the threat. –> containment, eradication, and recovery
192. Match the Linux CLI commands to their function. (Not all options are used.)