Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Cisco
Exam 3: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Which signature impacts network traffic by causing legitimate traffic to be blocked?
Question 42
Multiple Choice
A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs. Which technology should be used to accomplish this task?
Question 43
Multiple Choice
Which system monitors local system operation and local network access for violations of a security policy?
Question 44
Multiple Choice
Refer to the exhibit. Which application protocol is in this PCAP file?
Question 45
Multiple Choice
Which regex matches only on all lowercase letters?
Question 46
Multiple Choice
Which incidence response step includes identifying all hosts affected by an attack?
Question 47
Multiple Choice
Which type of data collection requires the largest amount of storage space?
Question 48
Multiple Choice
While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header. Which technology makes this behavior possible?
Question 49
Multiple Choice
Refer to the exhibit. What does the message indicate?
Question 50
Multiple Choice
A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?
Question 51
Multiple Choice
Which HTTP header field is used in forensics to identify the type of browser used?
Question 52
Multiple Choice
What is a difference between inline traffic interrogation and traffic mirroring?
Question 53
Multiple Choice
An analyst discovers that a legitimate security alert has been dismissed. Which signature caused this impact on network traffic?
Question 54
Multiple Choice
Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?
Question 55
Multiple Choice
Refer to the exhibit. What is the expected result when the "Allow subdissector to reassemble TCP streams" feature is enabled?
Question 56
Multiple Choice
Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)
Question 57
Multiple Choice
An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. What is the initial event called in the NIST SP800-61?