Category: CCNA Cyber Ops v1.1
CCNA Cyber OPS v1.1 Final Exam Answers 1. Refer to the exhibit. A network security specialist issues the command tcpdump to capture events. What does the number 6337 indicate? the number of transactions currently captured the process id of the tcpdump command* the port that tcpdump is listening to …
1. What is the main purpose of cyberwarfare? to protect cloud-based data centers to gain advantage over adversaries* to develop advanced network devices to simulate possible war scenarios among nations 2. A technician has installed a third party utility that is used to manage a Windows 7 computer. …
CCNA Cyber OPS v1.1 Chapter 13 Exam Answers 1. In the NIST incident response process life cycle, which type of attack vector involves the use of brute force against devices, networks, or services? Media Impersonation Attrition * Loss or theft 2. Which NIST incident response life cycle phase …
1. Which two technologies are used in the ELSA tool? (Choose two.) MySQL * CapME Suricata Sphinx Search * Security Onion 2. What is the host-based intrusion detection tool that is integrated into Security Onion? OSSEC * Snort Sguil Wireshark 3. According to NIST, which step in the …
1. Which statement describes the tcpdump tool? It is a command line packet analyzer. * It is used to control multiple TCP-based applications. It accepts and analyzes data captured by Wireshark. It can be used to analyze network log data in order to describe and predict network behavior. …