CERTIFICATION CYBEROPS EXAM PRACTICE/REVISION Flashcards
(94 cards)
Match the definition to the Microsoft Windows term. (Not all options are used.)
HANDLE – Provides access needed by the user space process.
REGISTRY – Database of hardware, software, users and settings.
THREAD – BLANK
WMI – Manages remote computers
CASE 2 Match the definition to the Microsoft Windows term. (Not all options are used.)
PROCESS – Currently executing program
REGISTRY – BLANK
SERVICE – Runs in the background to support the operating system and applications
THREAD – Instructions executed by the processor
What are two motivating factors for nation-state sponsored threat actors? (Choose two.)
Industrial espionage
AND
Disruption of trade or infrastructure
Explanation: Nation-state threat actors are not typically interested or motivated by financial gain. They are primarily involved in corporate espionage or disrupting international trade or critical infrastructure.
Match the description to the Linux term. (Not all options are used.)
FORK – Creates a copy of a process due to multi-tasking
HANDLE – BLANK
PERMISSIONS – Determines user rights to a file
PROCESS – A running instance of a computer program.
Match the antimalware approach to the description.
Recognises charactertistics of known malware files – signature-based
Recognises general features shared by types of malware – heuristics based
Recognises malware through types of suspicious actions – behaviour based
Which type of data is used by Cisco Cognitive Intelligence to find malicious activity that has bypassed security controls, or entered through unmonitored channels, and is operating inside an enterprise network?
Statistical
Explanation: Cisco Cognitive Intelligence utilizes statistical data for statistical analysis in order to find malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside the network of an organization.
Which type of evasion technique splits malicious payloads into smaller packets in order to bypass security sensors that do not reassemble the payloads before scanning them?
Traffic fragmentation
Explanation: In order to keep the malicious payload from being recognized by security sensors, such as IPS or IDS, perpetrators fragment the data into smaller packets.These fragments can be passed by sensors that do not reassemble the data before scanning.
Which type of cyber attack is a form of MiTM in which the perpetrator copies IP packets off the network without modifying them?
Eavesdropping
Explanation: An eavesdropping attack is a form of man-in-the-middle in which the perpetrator just reads or copies IP packets off the network but does not alter them.
Which is an example of social engineering?
An unidentified person claiming to be a technician collecting user information from employees.
Explanation: A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.
Which component is a pillar of the zero trust security approach that focuses on the secure access of devices, such as servers, printers, and other endpoints, including devices attached to IoT?
Workplace.
Explanation: The workplace pillar focuses on secure access for any and all devices, including devices on the internet of things (IoT), which connect to enterprise networks, such as user endpoints, physical and virtual servers, printers, cameras, HVAC systems, kiosks, infusion pumps, industrial control systems, and more.
A security analyst is reviewing information contained in a Wireshark capture created during an attempted intrusion. The analyst wants to correlate the Wireshark information with the log files from two servers that may have been compromised. What type of information can be used to correlate the events found in these multiple data sets?
IP five-tuples.
Explanation: The source and destination IP address, ports, and protocol (the IP five-tuples) can be used to correlate different data sets when analyzing an intrusion.
A security analyst is investigating a cyber attack that began by compromising one file system through a vulnerability in a custom software application. The attack now appears to be affecting additional file systems under the control of another security authority. Which CVSS v3.0 base exploitability metric score is increased by this attack characteristic?
Scope.
Explanation: The scope metric is impacted by an exploited vulnerability that can affect resources beyond the authorized privileges of the vulnerable component or that are managed by a different security authority.
Which regular expression would match any string that contains 4 consecutive zeros?
0{4}
Explanation: The regular expression 0{4} matches any string that contains 4 repetitions of zero or 4 consecutive zeros.
Refer to the exhibit. https://snipboard.io/VOiGWc.jpg Which technology generated the event log? :
Netflow.
Explanation: The source of the output is Netflow.
Refer to the exhibit. https://snipboard.io/1W3ukp.jpg A security specialist is using Wireshark to review a PCAP file generated by tcpdump . When the client initiated a file download request, which source socket pair was used?
209.165.200.235:48598
Explanation: The combination of the source IP address and source port number, or the destination IP address and destination port number, is known as a socket. A socket is shown as the IP address and associated port number with a colon in between the two (IP_address:port_number).
Match the security service with the description.
Allows administrators to manage network devices – (Simple Network Management Protocol) SNMP
A series of commands that control whether a device forwards or drops packets – (Access-control list) ACL
Allows a switch to make duplicate copies of traffic that is sent to a traffic analyzer – PORT MONITORING
Provides statistics on packets flowing through CISCO router or multi-layer switch - NETFLOW
Using Tcpdump and Wireshark, a security analyst extracts a downloaded file from a pcap file. The analyst suspects that the file is a virus and wants to know the file type for further examination. Which Linux command can be used to determine the file type?
File
Explanation: The Linux file command can be used to determine a file type, such as whether it is executable, ASCII text, or zip.
Match the IPS alarm with the description.
Normal traffic is correctly not identified as a threat – TRUE NEGATIVE
Malicious Traffic is correctly identified as a threat – TRUE POSITIVE
Malicious Traffic is not correctly ideantified as a threat – FALSE NEGATIVE
Normal Traffic is incorectly identified as a threat – FALSE POSITIVE
What is a feature of an IPS?
It can stop malicious packets.
Explanation: An advantage of an intrusion prevention systems (IPS) is that it can identify and stop malicious packets. However, because an IPS is deployed inline, it can add latency to the network.
Which three fields are found in both the TCP and UDP headers? (Choose three.)
- Checksum
- Destination port
- Source port
Explanation: The UPD header has four fields. Three of these fields are in common with the TCP header. These three fields are the source port, destination port, and checksum.
What will match the regular expression ^83?
any string that begins with 83
What is a key difference between the data captured by NetFlow and data captured by Wireshark?
NetFlow collects metadata from a network flow whereas Wireshark captures full data packets.
NETFLOW - NETOWORK FLOW METADATA
WIRESHARK - FULL DATA PACKETS
Explanation: Wireshark captures the entire contents of a packet. NetFlow does not. Instead, NetFlow collects metadata, or data about the flow.
Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.)
- Flag
- Identification
- Fragment offset
Explanation: Unlike IPv4, IPv6 routers do not perform fragmentation. Therefore, all three fields supporting fragmentation in the IPv4 header are removed and have no equivalent in the IPv6 header. These three fields are fragment offset, flag, and identification. IPv6 does support host packet fragmentation through the use of extension headers, which are not part of the IPv6 header.
What classification is used for an alert that correctly identifies that an exploit has occurred?
True positive
Explanation: A true positive occurs when an IDS and IPS signature is correctly fired and an alarm is generated when offending traffic is detected.