Category: CCNA Cyber Ops v1.1

Show Posts in

CCNA Cyber OPS v1.1 Chapter 10 Exam Answers

1. Which HIDS is an open source product? Tripwire OSSEC * Cisco AMP AlienVault USM 2. In Windows Firewall, when is the Domain profile applied? When the host accesses the Internet When the host checks emails from an enterprise email server When the host is connected to a …

CCNA Cyber Ops v1.1 Chapter 9 Exam Answers

1. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? DH * A private key A digital certificate A different public key 2. Which type of attack does the use of HMACs protect against? DoS DDoS Brute force Man-in-the-middle * …

CCNA Cyber Ops v1.1 Chapter 8 Exam Answers

1. With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Artichoke * Lettuce Onion Cabbage 2. What is a characteristic of a layered defense-in-depth security approach? Three or more devices are used. Routers are replaced with firewalls. When one device fails, …

CCNA Cyber Ops v1.1 Chapter 7 Exam Answers

1. Which technology is a proprietary SIEM system? SNMP agent Splunk * Stealthwatch NetFlow collector 2. Which term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs? True positive True negative False positive * False negative 3. Which monitoring technology mirrors …

CCNA Cyber Ops v1.1 Chapter 6 Exam Answers

1. What type of attack uses zombies? Trojan horse SEO poisoning Spear phishing DDoS * 2. What is the best description of Trojan horse malware? It is the most easily detected form of malware. It appears as useful software but hides malicious code. * It is malware that …