CyberOps Associate 1.0 Final Exam Flashcards
101 Questions
101 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two)

  • 802.1x authentication (correct)
  • SMTP email service
  • FTP file transfer
  • HTTPS web service (correct)

Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?

Deploy a Cisco SSL Appliance.

Which three objectives must the BYOD security policy address? (Choose three)

  • The level of access of employees when connecting to the corporate network must be defined. (correct)
  • Safeguards must be put in place for any personal device being compromised. (correct)
  • All personal devices must be registered with the IT department.
  • Rights and activities permitted on the corporate network must be defined. (correct)

What type of attack targets an SQL database using the input field of a user?

<p>SQL injection</p> Signup and view all the answers

What are two characteristics of Ethernet MAC addresses? (Choose two)

<p>They are globally unique. (C), They are expressed as 12 hexadecimal digits. (D)</p> Signup and view all the answers

What conclusion can be drawn based on the connectivity test using the command 'ping 127.0.0.1' that returns four positive replies?

<p>The TCP/IP implementation is functional.</p> Signup and view all the answers

What characterizes a threat actor?

<p>They always try to cause some harm to an individual or organization.</p> Signup and view all the answers

What type of malware presents a user with a screen requesting payment before data access?

<p>a type of ransomware</p> Signup and view all the answers

Which ICMPv6 message type provides network addressing information to hosts that use SLAAC?

<p>router advertisement</p> Signup and view all the answers

Which tool included in the Security Onion is a series of software plugins that send different types of data to the Elasticsearch data stores?

<p>Beats</p> Signup and view all the answers

Which two types of unreadable network traffic could be eliminated from data collected by NSM? (Choose two)

<p>SSL traffic (A), IPsec traffic (B)</p> Signup and view all the answers

What is the core open source component of the Elastic-stack responsible for accepting data in its native format?

<p>Logstash</p> Signup and view all the answers

In the NIST incident response process life cycle, which type of attack vector involves the use of brute force?

<p>attrition</p> Signup and view all the answers

What is a characteristic of CybOX?

<p>It is a set of standardized schemata for specifying, capturing, characterizing, and communicating events and properties of network operations.</p> Signup and view all the answers

What are two ways that ICMP can be a security threat to a company? (Choose two)

<p>by providing a conduit for DoS attacks (A), by collecting information about a network (B)</p> Signup and view all the answers

What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

<p>All ARP request messages must be processed by all nodes on the local network. (A), The ARP request is sent as a broadcast and will flood the entire subnet. (D)</p> Signup and view all the answers

Which field in the Sguil application window indicates the priority of an event or set of correlated events?

<p>ST</p> Signup and view all the answers

Match the job titles to SOC personnel positions:

<p>Tier 1 Alert Analyst = Monitors incoming alerts &amp; verifies that a true incident has occurred Tier 2 Incident Responder = Involved in deep investigation of incident Tier 3 Subject Matter Expert = Involved in hunting for potential threats &amp; implements threat detection tools</p> Signup and view all the answers

If the default gateway is configured incorrectly on the host, what is the impact on communications?

<p>The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.</p> Signup and view all the answers

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

<p>Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.</p> Signup and view all the answers

What is the prefix length notation for the subnet mask 255.255.255.224?

<p>/27</p> Signup and view all the answers

Which network monitoring tool saves captured network frames in PCAP files?

<p>Wireshark</p> Signup and view all the answers

What is the TCP mechanism used in congestion avoidance?

<p>Sliding window</p> Signup and view all the answers

What is the Internet?

<p>It provides connections through interconnected global networks.</p> Signup and view all the answers

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

<p>ICMP</p> Signup and view all the answers

What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

<p>Router Advertisement (A), Neighbor Solicitation (B)</p> Signup and view all the answers

What are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)

<p>Network Tap (C), SPAN (D)</p> Signup and view all the answers

Which network monitoring tool is in the category of network protocol analyzers?

<p>Wireshark</p> Signup and view all the answers

Based on the command output shown, which file permission or permissions have been assigned to the other user group for the data.txt file?

<p>read</p> Signup and view all the answers

What are three benefits of using symbolic links over hard links in Linux? (Choose three.)

<p>They can show the location of the original file. (A), They can link to a file in a different file system. (B), They can link to a directory. (D)</p> Signup and view all the answers

A network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center. Which aspect of secure communications is addressed by this security measure?

<p>Data integrity</p> Signup and view all the answers

A network administrator is configuring a AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.)

<p>Separate processes for authentication and authorization (B), Encryption for all communication (C)</p> Signup and view all the answers

In an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks. What three types of attributes or indicators of compromise are helpful to share? (Choose three.)

<p>Features of malware files (B), IP addresses of attack servers (C), Changes made to end system software (D)</p> Signup and view all the answers

Which two types of messages are used in place of ARP for address resolution in IPv6? (Choose two.)

<p>Neighbor Advertisement (B), Neighbor Solicitation (D)</p> Signup and view all the answers

What is indicated by a true negative security alert classification?

<p>Normal traffic is correctly ignored and erroneous alerts are not being issued.</p> Signup and view all the answers

Normal traffic is correctly ignored and erroneous alerts are not being issued. What does this describe?

<p>It compares the behavior of a host to an established baseline to identify potential intrusions.</p> Signup and view all the answers

Match the description to the antimalware approach:

<p>Signature-based = By recognizing various characteristics of known malware files Heuristics-based = By recognizing general features shared by various types of malware Behavior-based = Through analysis of suspicious activities</p> Signup and view all the answers

Which two protocols are associated with the transport layer? (Choose two.)

<p>UDP (B), TCP (D)</p> Signup and view all the answers

A network administrator is creating a network profile to generate a network baseline. What is included in the critical asset address space element?

<p>The IP addresses or the logical location of essential systems or data.</p> Signup and view all the answers

What are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)

<p>Integrity (A), Availability (B), Confidentiality (C)</p> Signup and view all the answers

What is a characteristic of DNS?

<p>DNS servers can cache recent queries to reduce DNS query traffic.</p> Signup and view all the answers

What are two differences between HTTP and HTTP/2? (Choose two.)

<p>HTTP/2 uses a compressed header to reduce bandwidth requirements. (A), HTTP/2 uses multiplexing to support multiple streams and enhance efficiency. (B)</p> Signup and view all the answers

Match the step to the task performed by the router when sending a packet destined for a network in the routing table:

<p>Step 1 = Both are deployed as sensors. Step 2 = Both use signatures to detect malicious traffic.</p> Signup and view all the answers

Which statement describes a typical security policy for a DMZ firewall configuration?

<p>Traffic that originates from the DMZ interface is selectively permitted to the outside interface.</p> Signup and view all the answers

After complaints from users, a technician identifies that the college web server is running very slowly. What is the source of the problem?

<p>A DDoS attack is in progress.</p> Signup and view all the answers

Which two statements describe access attacks? (Choose two.)

<p>Password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers. (C), Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code. (D)</p> Signup and view all the answers

Which two actions can be taken when configuring Windows Firewall? (Choose two.)

<p>Allow a different software firewall to control access. (C), Manually open ports that are required for specific applications. (D)</p> Signup and view all the answers

Which statement describes the state of the administrator and guest accounts after a user installs Windows desktop version to a new computer?

<p>By default, both the administrator and guest accounts are disabled.</p> Signup and view all the answers

What is a purpose of entering the nslookup cisco.com command on a Windows PC?

<p>To check if the DNS service is running.</p> Signup and view all the answers

How is the event ID assigned in Sguil?

<p>Each event in the series of correlated events is assigned a unique ID.</p> Signup and view all the answers

Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)

<p>STP traffic (A), Routing updates traffic (C)</p> Signup and view all the answers

What are two elements that form the PRI value in a syslog message? (Choose two.)

<p>Facility (B), Severity (C)</p> Signup and view all the answers

Which three pieces of information are found in session data? (Choose three.)

<p>Source and destination port numbers (A), Source and destination IP addresses (B), Layer 4 transport protocol (C)</p> Signup and view all the answers

What kind of ICMP message can be used by threat actors to perform network reconnaissance and scanning attacks?

<p>ICMP unreachable</p> Signup and view all the answers

A flood of packets with invalid source IP addresses requests a connection on the network. What type of attack has occurred?

<p>TCP SYN flood</p> Signup and view all the answers

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

<p>DHCP spoofing</p> Signup and view all the answers

Users report that a database file on the main server cannot be accessed. What type of attack has the organization experienced?

<p>Ransomware</p> Signup and view all the answers

What two kinds of personal information can be sold on the dark web by cybercriminals? (Choose two.)

<p>Facebook photos (B), Street address (C)</p> Signup and view all the answers

What three services are offered by FireEye? (Choose three.)

<p>Identifies and stops latent malware on files (A), Blocks attacks across the web (B), Identifies and stops email threat vectors (D)</p> Signup and view all the answers

After containment, what is the first step of eradicating an attack?

<p>Identify all hosts that need remediation.</p> Signup and view all the answers

Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?

<p>Install a web shell on the target web server for persistent access.</p> Signup and view all the answers

When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)

<p>Perform regular vulnerability scanning and penetration testing. (A), Train web developers for securing code. (D)</p> Signup and view all the answers

How does using HTTPS complicate network security monitoring?

<p>HTTPS adds complexity to captured packets.</p> Signup and view all the answers

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)

<p>Certificate authority (C), Digital certificates (D)</p> Signup and view all the answers

Which three algorithms are designed to generate and verify digital signatures? (Choose three.)

<p>DSA (A), ECDSA (B), RSA (C)</p> Signup and view all the answers

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

<p>Identification and authentication policy</p> Signup and view all the answers

Refer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device has the MAC address d8:cb:8a:5c:d5:8a?

<p>PC-A</p> Signup and view all the answers

What kind of message is sent by a DHCPv4 client requesting an IP address?

<p>DHCPDISCOVER broadcast message</p> Signup and view all the answers

What is the responsibility of the human resources department when handling a security incident?

<p>Apply disciplinary measures if an incident is caused by an employee.</p> Signup and view all the answers

How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?

<p>By combining data from multiple technologies.</p> Signup and view all the answers

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

<p>Network layer</p> Signup and view all the answers

What is the purpose of CSMA/CA?

<p>To prevent collisions.</p> Signup and view all the answers

Why is DHCP preferred for use on large networks?

<p>It is a more efficient way to manage IP addresses than static address assignment.</p> Signup and view all the answers

Which NIST incident response life cycle phase includes continuous monitoring by the CSIRT to quickly identify and validate an incident?

<p>Detection and analysis</p> Signup and view all the answers

What will a threat actor do to create a back door on a compromised target according to the Cyber Kill Chain model?

<p>Add services and autorun keys.</p> Signup and view all the answers

Which type of evidence supports an assertion based on previously obtained evidence?

<p>Corroborating evidence</p> Signup and view all the answers

A technician is configuring email on a mobile device. Which email protocol should the technician use to synchronize folders between the mobile device and the server?

<p>IMAP</p> Signup and view all the answers

What is the goal of an attack in the installation phase of the Cyber Kill Chain?

<p>Create a back door in the target system to allow for future access.</p> Signup and view all the answers

Which two statements are characteristics of a virus? (Choose two.)

<p>A virus can be dormant and then activate at a specific time or date. (C), A virus typically requires end-user activation. (D)</p> Signup and view all the answers

What is a characteristic of a Trojan horse as it relates to network security?

<p>Malware is contained in a seemingly legitimate executable program.</p> Signup and view all the answers

What technique is used in social engineering attacks?

<p>Phishing</p> Signup and view all the answers

What is a purpose of implementing VLANs on a network?

<p>They can separate user traffic.</p> Signup and view all the answers

A cybersecurity analyst needs to collect alert data. What are three detection tools to perform this task in the Security Onion architecture? (Choose three.)

<p>Wazuh (A), Zeek (B), CapME (C)</p> Signup and view all the answers

In network security assessments, which type of test is used to evaluate the risk posed by vulnerabilities to a specific organization?

<p>Risk analysis</p> Signup and view all the answers

In addressing an identified risk, which strategy aims to shift some of the risk to other parties?

<p>Risk sharing</p> Signup and view all the answers

What is a network tap?

<p>A passive device that forwards all traffic and physical layer errors to an analysis device.</p> Signup and view all the answers

If a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be considered within its goal?

<p>Approximately 5 minutes per year.</p> Signup and view all the answers

The HTTP server has responded to a client request with a 200 status code. What does this status code indicate?

<p>The request was completed successfully.</p> Signup and view all the answers

What is an advantage for small organizations of adopting IMAP instead of POP?

<p>Messages are kept in the mail servers until they are manually deleted from the email client.</p> Signup and view all the answers

What debugging security tool can be used by black hats to reverse engineer binary files when writing exploits?

<p>WinDbg</p> Signup and view all the answers

What is a property of the ARP table on a device?

<p>Entries in an ARP table are time-stamped and are purged after the timeout expires.</p> Signup and view all the answers

What is the purpose of Tor?

<p>To allow users to browse the Internet anonymously.</p> Signup and view all the answers

Which two network protocols can be used by a threat actor to exfiltrate data in traffic that is disguised as normal network traffic? (Choose two.)

<p>DNS (B), HTTP (C)</p> Signup and view all the answers

What is a key difference between the data captured by NetFlow and data captured by Wireshark?

<p>NetFlow collects metadata from a network flow whereas Wireshark captures full data packets.</p> Signup and view all the answers

Which tool captures full data packets with a command-line interface only?

<p>tcpdump</p> Signup and view all the answers

Which method can be used to harden a device?

<p>Use SSH and disable the root account access over SSH.</p> Signup and view all the answers

In a Linux operating system, which component interprets user commands and attempts to execute them?

<p>Shell</p> Signup and view all the answers

A network administrator is configuring an AAA server to manage RADIUS authentication. Which two features are included in RADIUS authentication? (Choose two.)

<p>Hidden passwords during transmission (B), Single process for authentication and authorization (D)</p> Signup and view all the answers

What is privilege escalation?

<p>Vulnerabilities in systems are exploited to grant higher levels of privilege than someone or some process should have.</p> Signup and view all the answers

What two assurances does digital signing provide about code that is downloaded from the Internet? (Choose two.)

<p>The code is authentic and is actually sourced by the publisher. (A), The code has not been modified since it left the software publisher. (D)</p> Signup and view all the answers

An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees.

<p>PKI applications provide encrypted communication and secure identity verification.</p> Signup and view all the answers

Flashcards

Router Advertisement

A network discovery mechanism used in IPv6 networks to inform nodes about the presence of routers and network parameters.

Beats

A collection of lightweight data shippers that help send different types of data (logs, metrics, etc.) to Elasticsearch for analysis.

Unreadable Network Traffic

Network traffic that is encrypted and therefore cannot be read by standard tools.

Logstash

A core open-source component of the Elastic Stack that processes and transforms data from various sources, making data consistent for analysis.

Signup and view all the flashcards

Attrition

An attack vector characterized by using brute force techniques to compromise devices, networks, or services.

Signup and view all the flashcards

CybOX

A standardized framework that helps in specifying, capturing, characterizing, and communicating cybersecurity events and properties related to network operations.

Signup and view all the flashcards

Information Gathering

ICMP can be used to gather information about network structure and devices, revealing potential vulnerabilities.

Signup and view all the flashcards

Denial of Service (DoS) Attacks

ICMP can facilitate DoS attacks by overwhelming targeted systems with traffic, affecting network availability.

Signup and view all the flashcards

Study Notes

ARP Requests and Local Network

  • High volume of ARP requests creates network processing overhead for all local nodes.
  • Flooding occurs due to ARP requests being broadcast to the entire subnet.

Security Operations Center (SOC) Personnel

  • Tier 1 Alert Analyst: Monitors incoming alerts and verifies incidents.
  • Tier 2 Incident Responder: Conducts in-depth investigation of incidents.
  • Tier 3 Subject Matter Expert: Engages in threat hunting and implements detection tools.

Network Communication Issues

  • Incorrect default gateway prevents communication with remote networks while allowing local communication.

Data Detection and Retrospection

  • Connectionless protocols rely on upper-layer connection-oriented protocols to detect missing data and request retransmissions.

Internet Routing and Protocols

  • Prefix length notation for subnet mask 255.255.255.224 is /27.
  • Traceroute utilizes ICMP for echo requests and replies.
  • Neighbor Solicitation and Router Advertisement messages are unique to ICMPv6.

Network Monitoring Tools

  • Wireshark is identified as a protocol analyzer that captures network frames in PCAP files.
  • SPAN and network tap are monitoring tools that capture and forward traffic.

TCP and Network Security

  • Sliding window is used in TCP for congestion avoidance.
  • Ransomware encrypts files and demands payment for access.

Cyber Security Practices

  • TACACS+ provides encrypted communication and separates authentication from authorization processes.
  • Sharing indicators of compromise among cyber analysts enhances detection and prevention.

Network Traffic Management

  • ICMP messages like neighbor solicitation and advertisement function in IPv6 for address resolution.
  • HTTP/2 improves efficiency with multiplexing and header compression compared to HTTP.

Security Incident Responses

  • True negative security alerts indicate correct identification of normal traffic.
  • Security policies define authorized access to enterprise data.

Cyber Kill Chain Model

  • Back doors are created for future access in the installation phase post-compromise.
  • Risk analysis evaluates vulnerabilities and their impact on organizations.

Data Exfiltration and Threat Actors

  • DNS and HTTP can be misused by threat actors for data exfiltration.
  • Identifying and verifying incidents involves continuous monitoring in incident response.

Public Key Infrastructure (PKI)

  • Digital certificates and certificate authorities are essential components of PKI in network security.

Common Malware Characteristics

  • Viruses require user activation, can remain dormant, and activate later.
  • Trojans disguise malware within legitimate-looking programs.

Email Configuration and Protocols

  • IMAP allows synchronization of emails across devices while retaining originals on the server.

Network Access Control

  • Risk sharing shifts some risk to other parties and can help mitigate threats in network infrastructure.

Traffic Analysis and Monitoring Tools

  • Network taps passively forward all traffic for analysis and capture metadata for understanding flow dynamics.

System Hardening Techniques

  • Disabling root access over SSH and implementing SSH for secure remote access are essential for hardening devices.

Personal Security Awareness

  • BYOD policies must define user rights, safeguard personal devices, and regulate access levels to corporate networks.

Cybersecurity Threat Impacts

  • SQL injection attacks exploit input fields to manipulate databases.
  • Corroborating evidence supports claims with supplementary facts.

Final Insights

  • Effective security monitoring against SSL-encrypted traffic requires specialized tools like Cisco SSL Appliances.
  • Networking reliability is gauged by uptime metrics, aiming for minimal yearly downtime, around 5 minutes for high availability goals.### Network Security Concepts
  • Router Advertisement: A network discovery mechanism used in IPv6 networks to inform nodes about the presence of routers and network parameters.

Tools in Security Onion

  • Beats: A collection of lightweight data shippers that help send different types of data (logs, metrics, etc.) to Elasticsearch for analysis.

Network Traffic and Data Collection

  • Unreadable Network Traffic:
    • IPsec Traffic: Encrypted traffic that secures Internet Protocol communications, often eliminating visibility into the data.
    • SSL Traffic: Encrypted traffic using Secure Sockets Layer for secure communication over a computer network, making the data unreadable.

Log Management

  • Logstash: A core open-source component of the Elastic Stack that processes and transforms data from various sources, making data consistent for analysis.

Incident Response Processes

  • Attrition: An attack vector characterized by using brute force techniques to compromise devices, networks, or services.

Cyber Threat Intelligence

  • CybOX: A standardized framework that helps in specifying, capturing, characterizing, and communicating cybersecurity events and properties related to network operations.

ICMP Security Threats

  • Information Gathering: ICMP can be exploited to gather information about network structure and devices, revealing potential vulnerabilities.
  • Denial of Service (DoS) Attacks: ICMP can facilitate DoS attacks by overwhelming targeted systems with traffic, affecting network availability.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz features flashcards designed for the CyberOps Associate 1.0 final exam. It covers key concepts such as ARP messages and event prioritization in network security tools. Test your knowledge and prepare for your certification with these essential questions.

More Like This

Use Quizgecko on...
Browser
Browser